-
1
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Deventer, The Netherlands, The Netherlands: Kluwer, B.V.
-
P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security. Deventer, The Netherlands, The Netherlands: Kluwer, B.V., 2002, pp. 107-121.
-
(2002)
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
2
-
-
0033357103
-
Securing ad hoc networks
-
Nov/Dec
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol.13, no.6, pp. 24-30, Nov/Dec 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
3
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
New York, NY, USA: ACM, 2000
-
Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 275-283.
-
MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
4
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA: ACM, 2000
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 255-265.
-
MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
5
-
-
0242696192
-
Performance analysis of the confidant protocol
-
New York, NY, USA: ACM
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the confidant protocol," in MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM, 2002, pp. 226-236.
-
(2002)
MobiHoc '02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
6
-
-
11244333253
-
Trust evaluation in ad-hoc networks
-
New York, NY, USA: ACM
-
G. Theodorakopoulos and J. S. Baras, "Trust evaluation in ad-hoc networks," in WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security. New York, NY, USA: ACM, 2004, pp. 1-10.
-
(2004)
WiSe '04: Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 1-10
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
7
-
-
34547407799
-
Robust cooperative trust establishment for manets
-
New York, NY, USA: ACM, 2006
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "Robust cooperative trust establishment for manets," in SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2006, pp. 23-34.
-
SASN '06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 23-34
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
8
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
New York, NY, USA: ACM, 2003
-
Y.-A. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," in SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2003, pp. 135-147.
-
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 135-147
-
-
Huang, Y.-A.1
Lee, W.2
-
9
-
-
33646552392
-
Secure routing and intrusion detection in ad hoc networks
-
IEEE, March
-
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure routing and intrusion detection in ad hoc networks," in Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, 2005. PerCom 2005. IEEE, March 2005, pp. 191-199.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications 2005. PerCom 2005
, pp. 191-199
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
10
-
-
33749048728
-
Cross-layer analysis for detecting wireless misbehavior
-
IEEE, Jan.
-
J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer analysis for detecting wireless misbehavior," in Proceedings of the Third IEEE Consumer Communications and Networking Conference, 2006. CCNC 2006., vol. 1. IEEE, Jan. 2006, pp. 6-9.
-
(2006)
Proceedings of the Third IEEE Consumer Communications and Networking Conference, 2006. CCNC 2006
, vol.1
, pp. 6-9
-
-
Parker, J.1
Patwardhan, A.2
Joshi, A.3
-
11
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
July
-
S. Buchegger and J.-Y. Le Boudee, "Self-policing mobile ad hoc networks by reputation systems," IEEE Communications Magazine, vol.43, no.7, pp. 101-107, July 2005.
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.-Y.2
-
13
-
-
4143084830
-
Svm-based intrusion detection system for wireless ad hoc networks
-
Oct.
-
H. Deng, Q.-A. Zeng, and D. Agrawal, "Svm-based intrusion detection system for wireless ad hoc networks," in Proceedings of 2003 IEEE 58th Vehicular Technology Conference, 2003. VTC 2003-Fall., vol. 3, Oct. 2003, pp. 2147-2151.
-
(2003)
Proceedings of 2003 IEEE 58th Vehicular Technology Conference, 2003. VTC 2003-Fall
, vol.3
, pp. 2147-2151
-
-
Deng, H.1
Zeng, Q.-A.2
Agrawal, D.3
-
14
-
-
4544342574
-
A specification-based intrusion detection system for aodv
-
New York, NY, USA: ACM
-
C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A specification-based intrusion detection system for aodv," in SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2003, pp. 125-134.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
15
-
-
1542299118
-
Ad hoc-vcg: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
-
New York, NY, USA: ACM
-
L. Anderegg and S. Eidenbenz, "Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents," in MobiCom '03: Proceedings of the 9th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2003, pp. 245-259.
-
(2003)
MobiCom '03: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking
, pp. 245-259
-
-
Anderegg, L.1
Eidenbenz, S.2
-
16
-
-
9144231402
-
Providing fault-tolerant ad hoc routing service in adversarial environments
-
Y. Xue and K. Nahrstedt, "Providing fault-tolerant ad hoc routing service in adversarial environments," Wirel. Pers. Commun., vol.29, no.3-4, pp. 367-388, 2004.
-
(2004)
Wirel. Pers. Commun.
, vol.29
, Issue.3-4
, pp. 367-388
-
-
Xue, Y.1
Nahrstedt, K.2
-
17
-
-
34547461705
-
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
-
New York, NY, USA: ACM, 2006
-
M. Kefayati, H. R. Rabiee, S. G. Miremadi, and A. Khonsari, "Misbehavior resilient multi-path data transmission in mobile ad-hoc networks," in SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2006, pp. 91-100.
-
SASN '06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 91-100
-
-
Kefayati, M.1
Rabiee, H.R.2
Miremadi, S.G.3
Khonsari, A.4
-
18
-
-
80755124447
-
Security through collaboration in manets
-
ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Springer
-
W. Li, J. Parker, and A. Joshi, "Security through collaboration in manets," in Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), vol.10. Springer, 2008, pp. 696-714.
-
(2008)
Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008
, vol.10
, pp. 696-714
-
-
Li, W.1
Parker, J.2
Joshi, A.3
-
19
-
-
70349504836
-
Outlier detection in ad hoc networks using dempster-shafer theory
-
May
-
W. Li and A. Joshi, "Outlier detection in ad hoc networks using dempster-shafer theory," in Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009. MDM '09., May 2009, pp. 112-121.
-
(2009)
Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware 2009. MDM '09
, pp. 112-121
-
-
Li, W.1
Joshi, A.2
-
20
-
-
70849136410
-
Policy-based malicious peer detection in ad hoc networks
-
Aug.
-
W. Li, A. Joshi, and T. Finin, "Policy-based malicious peer detection in ad hoc networks," in Proceedings of the International Conference on Computational Science and Engineering, 2009. CSE '09., vol. 3, Aug. 2009, pp. 76-82.
-
(2009)
Proceedings of the International Conference on Computational Science and Engineering 2009. CSE '09
, vol.3
, pp. 76-82
-
-
Li, W.1
Joshi, A.2
Finin, T.3
-
22
-
-
4544283175
-
Sori: A secure and objective reputationbased incentive scheme for ad-hoc networks
-
March, Vol.2
-
Q. He, D. Wu, and P. Khosla, "Sori: a secure and objective reputationbased incentive scheme for ad-hoc networks," in Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC '04., vol. 2, March 2004, pp. 825-830 Vol.2.
-
(2004)
Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC '04
, vol.2
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
24
-
-
50249090413
-
A data intensive reputation management scheme for vehicular ad hoc networks
-
July
-
A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A data intensive reputation management scheme for vehicular ad hoc networks," in Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops, Mobiquitous '06., July 2006, pp. 1-8.
-
(2006)
Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops, Mobiquitous '06
, pp. 1-8
-
-
Patwardhan, A.1
Joshi, A.2
Finin, T.3
Yesha, Y.4
-
26
-
-
0031652485
-
Glomosim: A library for parallel simulation of large-scale wireless networks
-
X. Zeng, R. Bagrodia, and M. Gerla, "Glomosim: a library for parallel simulation of large-scale wireless networks," ACM SIGSIM Simulation Digest, vol.28, no.1, pp. 154-161, 1998.
-
(1998)
ACM SIGSIM Simulation Digest
, vol.28
, Issue.1
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
|