-
1
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y. Sun,W. Yu, Z. Han, and K.J.R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol.24, no.2, pp.305-317, 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
2
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Feb.
-
G. Theodorakopoulos and J.S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun., vol.24, no.2, pp.318-328, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
3
-
-
42649129419
-
Future trust management framework for mobile ad hoc networks
-
April
-
J. Li, R. Li, and J. Kato, "Future trust management framework for mobile ad hoc networks," IEEE Commun. Mag., vol.46, no.4, pp.108-114, April 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.4
, pp. 108-114
-
-
Li, J.1
Li, R.2
Kato, J.3
-
5
-
-
63149130883
-
Voting-based clustering algorithm with subjective trust and stability in mobile ad-hoc networks
-
Dec.
-
S. Peng, W. Jia, and G. Wang, "Voting-based clustering algorithm with subjective trust and stability in mobile ad-hoc networks," Proc. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), vol.2, pp.3-9, Dec. 2008.
-
(2008)
Proc. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008)
, vol.2
, pp. 3-9
-
-
Peng, S.1
Jia, W.2
Wang, G.3
-
6
-
-
58049100792
-
Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks
-
Oct.
-
J. Luo, X. Liu, Y. Zhang, D. Ye, and Z. Xu, "Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks," Proc. 33rd IEEE Conference on Local Computer Networks (LCN 2008), pp.305-311, Oct. 2008.
-
(2008)
Proc. 33rd IEEE Conference on Local Computer Networks (LCN 2008)
, pp. 305-311
-
-
Luo, J.1
Liu, X.2
Zhang, Y.3
Ye, D.4
Xu, Z.5
-
7
-
-
33747431615
-
Incorporating trust and reputation in the DSR protocol for dependable routing
-
A.A. Pirzada, A. Datta, and C. McDonald, "Incorporating trust and reputation in the DSR protocol for dependable routing," Elsevier of Computer Communications, vol.29, pp.2806-2821, 2006.
-
(2006)
Elsevier of Computer Communications
, vol.29
, pp. 2806-2821
-
-
Pirzada, A.A.1
Datta, A.2
McDonald, C.3
-
8
-
-
49249085807
-
COSR: Cooperative on-demand secure route protocol in MANET
-
Oct.
-
F.Wang, Y. Mo, and B. Huang, "COSR: Cooperative on-demand secure route protocol in MANET," International Symposium on Communications and Information Technologies (ISCIT 2006), pp.890-893, Oct. 2006.
-
(2006)
International Symposium on Communications and Information Technologies (ISCIT 2006)
, pp. 890-893
-
-
Wang, F.1
Mo, Y.2
Huang, B.3
-
9
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug.
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Proc. MobiCom, pp.255-265, Boston, MA, Aug. 2000.
-
(2000)
Proc. MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
10
-
-
10644289075
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Sept.
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security Conference, Sept. 2002.
-
(2002)
Communication and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
11
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in Dynamic ad-hoc networks
-
June
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness In Dynamic ad-hoc networks," Proc. MobiHoc, pp.226-236, June 2002.
-
(2002)
Proc. MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
12
-
-
59649116337
-
A secure routing protocol against Byzantine attacks for MANETs in adversarial environments
-
Jan.
-
M. Yu, M. Zhou, and W. Su, "A secure routing protocol against Byzantine attacks for MANETs in adversarial environments," IEEE Trans. Veh. Technol., vol.58, no.1, pp.449-460, Jan. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.1
, pp. 449-460
-
-
Yu, M.1
Zhou, M.2
Su, W.3
-
13
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
ed. Tomasz Imielinski and Hank Korth, Chapter 5, Kluwer Academic Publishers
-
B. Johnson and D.A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing, ed. Tomasz Imielinski and Hank Korth, Chapter 5, pp.153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, B.1
Maltz, D.A.2
-
14
-
-
85052617391
-
Item-based collaborative filtering recommendation algorithms
-
Hong Kong, May
-
B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, "Item-based collaborative filtering recommendation algorithms," Proc. 10th International World Wide Web Conference, pp.285-295, Hong Kong, May 2001.
-
(2001)
Proc. 10th International World Wide Web Conference
, pp. 285-295
-
-
Sarwar, B.1
Karypis, G.2
Konstan, J.3
Riedl, J.4
-
15
-
-
3042697346
-
Evaluating collaborative filtering recommender systems
-
J.L. Herlocker, J.A. Konstan, L.G. Terveen, and J.T. Riedl, "Evaluating collaborative filtering recommender systems," ACM Trans. Information Systems, vol.22, no.1, pp.5-53, 2004.
-
(2004)
ACM Trans. Information Systems
, vol.22
, Issue.1
, pp. 5-53
-
-
Herlocker, J.L.1
Konstan, J.A.2
Terveen, L.G.3
Riedl, J.T.4
-
16
-
-
0004024262
-
The ad hoc on-demand distancevector protocol
-
ed. C.E. Perkins, Ch, Addison-Wesley, Reading, MA
-
C.E. Perkins and E.M. Royer, "The ad hoc on-demand distancevector protocol," in Ad Hoc Networking, ed. C.E. Perkins, Ch. 6, pp.173-220, Addison-Wesley, Reading, MA, 2001.
-
(2001)
Ad Hoc Networking
, vol.6
, pp. 173-220
-
-
Perkins, C.E.1
Royer, E.M.2
-
17
-
-
79957745487
-
Trust management in mobile ad hoc networks
-
ed. S. Misra, I. Woungang, and S.C. Misra, Springer
-
V. Balakrishnan, V. Varadharajan, and U. Tupakula, "Trust management in mobile ad hoc networks," in Guide toWireless Ad Hoc Networks, ed. S. Misra, I. Woungang, and S.C. Misra, Springer, 2009.
-
(2009)
Guide ToWireless Ad Hoc Networks
-
-
Balakrishnan, V.1
Varadharajan, V.2
Tupakula, U.3
-
18
-
-
85027173182
-
-
http://pcl.cs.ucla.edu/projects/glomosim/.
-
-
-
|