-
1
-
-
2342540625
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of service in sensor networks", IEEE Computer, pages 462, Oct. 2002.
-
(2002)
IEEE Computer
, pp. 462
-
-
Wood, A.1
Stankovic, J.2
-
3
-
-
24944560667
-
The new intrusion prevention and detection approaches for clustering-based sensor networks
-
Mar 13-17
-
C.-C. Su, K.-M. Chang, Y.-H. Kuo, and M.-F. Horng, "The new intrusion prevention and detection approaches for clustering-based sensor networks", in 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss Masses - Ready for Take-off, Mar 13-17 2005.
-
(2005)
2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss Masses - Ready for Take-off
-
-
Su, C.-C.1
Chang, K.-M.2
Kuo, Y.-H.3
Horng, M.-F.4
-
4
-
-
18844454790
-
Intrusion detection in sensor networks: A non-cooperative game approach
-
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
-
A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks: A non-cooperative game approach", in 3rd IEEE International Symposium on Network Computing (NCA 2004), Boston, MA, August 2004, pp. 343-346. (Pubitemid 40681696)
-
(2004)
Proceedings - Third IEEE International Symposium on Network Computing and Applications, NCA 2004
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
5
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
A. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, "Decentralized intrusion detection in wireless sensor networks", Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobilenetworks- 2005.
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobilenetworks
-
-
Da Silva, A.1
Martins, M.2
Rocha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.6
-
6
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of MOBICOM, 2000.
-
(2000)
Proceedings of MOBICOM
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
7
-
-
10644289075
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi, R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Communications and Multimedia Security Conference, 2002.
-
(2002)
Communications and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
8
-
-
10644269064
-
Prevention of denial of service attack and selfishness in mobile ad hoc networks
-
France
-
P. Michiardi, R. Molva, Prevention of denial of service attack and selfishness in mobile ad hoc networks, Research Report RR-02-063, Institute Euŕecom, France, 2002.
-
(2002)
Research Report RR-02-063, Institute Euŕecom
-
-
Michiardi, P.1
Molva, R.2
-
9
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of terminodes
-
L. Blazevic, L. Buttyaan, S. Capkun, S. Giordano, J.P. Hubaux, J. LeBoudec, Self-organization in mobile ad hoc networks: the approach of terminodes, IEEE Communications Magazine 39 (6) (2001) 161-174.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.6
, pp. 161-174
-
-
Blazevic, L.1
Buttyaan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.P.5
Leboudec, J.6
-
10
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
-
Swiss Federal Institute of Technology
-
L. Buttyaan, J.P. Hubaux, Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks, Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
-
(2001)
Technical Report DSC/2001/001, Department of Communication Systems
-
-
Buttyaan, L.1
Hubaux, J.P.2
-
11
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
May, May 2006
-
M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks, " in IEEE Trans. Mobile Computing, Vol. 5, May. 2006, pp. 1044-1049, May 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, pp. 1044-1049
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
12
-
-
17144395121
-
An analytical approach to the study of cooperation in wireless as hoc networks
-
March
-
V. Srinivasan, P. Nuggehalli, C. Chiasserini, and R. Rao, "An analytical approach to the study of cooperation in wireless as hoc networks, " IEEE Transactions on Wireless Communcations, vol. 4, pp. 722-733, March 2005.
-
(2005)
IEEE Transactions on Wireless Communcations
, vol.4
, pp. 722-733
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.3
Rao, R.4
-
14
-
-
39149117050
-
A game-theoretic intrusion detection model for mobile ad hoc networks
-
doi:10.1016/j.comcom.2007.10.024
-
H. Otrok et al., A game-theoretic intrusion detection model for mobile ad hoc networks, Comput. Commun. (2007), doi:10.1016/j.comcom.2007.10.024.
-
(2007)
Comput. Commun.
-
-
Otrok, H.1
-
15
-
-
60649107168
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
ACM
-
Y. Liu, C. Comaniciu, H. Man, A bayesian game approach for intrusion detection in wireless ad hoc networks, in: Proceedings of the GameNets06, ACM, 2006.
-
(2006)
Proceedings of the GameNets06
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
16
-
-
50949085025
-
A game theoretic approach to detect network intrusions: The cooperative intruders scenario
-
IEEE
-
M. Mehrandish, H. Otrok, M. Debbabi, C. Assi, P. Bhattacharya, A game theoretic approach to detect network intrusions: The cooperative intruders scenario, in: Proceedings of the 49th annual of IEEE GLOBECOM, IEEE, 2006.
-
(2006)
Proceedings of the 49th Annual of IEEE GLOBECOM
-
-
Mehrandish, M.1
Otrok, H.2
Debbabi, M.3
Assi, C.4
Bhattacharya, P.5
-
17
-
-
51749093355
-
Hit and run: A Bayesian game between malicious and regular nodes in MANETs
-
F. Li and J. Wu, "Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs", IEEE SECON 2008, pp. 432-440.
-
IEEE SECON 2008
, pp. 432-440
-
-
Li, F.1
Wu, J.2
-
19
-
-
84874825833
-
A game theoretic detection in mobile ad hoc networks
-
Mar.
-
A. Patcha and J. Park, " A Game Theoretic Detection in Mobile Ad Hoc Networks", in International Journal of Network Security, Vol.2, No.2, PP.131-137, Mar. 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 131-137
-
-
Patcha, A.1
Park, J.2
-
20
-
-
34548187304
-
Study of co-operation among selfish neighbors in MANET under evolutionary model
-
MIT Campus, Anna University, Chennai, India. Feb. 22-24
-
K. Komathy, P. Narayanasamy."Study of Co-Operation among Selfish Neighbors in MANET under Evolutionary Model". IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp.133-138.
-
(2007)
IEEE - ICSCN 2007
, pp. 133-138
-
-
Komathy, K.1
Narayanasamy, P.2
-
23
-
-
34548255006
-
-
Computer Science Department Florida State University, January 11
-
Jiangyi Hu. "Cooperation in Mobile Ad Hoc Networks". Computer Science Department Florida State University. January 11, 2005.
-
(2005)
Cooperation in Mobile Ad Hoc Networks
-
-
Hu, J.1
|