-
1
-
-
13844276649
-
Computer networks: Editorial
-
DOI 10.1016/j.comnet.2005.01.002, PII S1389128605000149
-
I. F. Akyildiz X. Wang 2005 Wireless mesh networks: A survey Computer Networks 47 445 487 1152.68319 10.1016/j.comnet.2005.01.002 (Pubitemid 40242421)
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 443-444
-
-
Akyildiz, I.F.1
Rudin, H.2
-
2
-
-
48049122172
-
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
-
Baras, J. S., Radosavac, S., et al. (2007). Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. In Proceedings of MILCOM2007.
-
(2007)
Proceedings of MILCOM2007.
-
-
Baras, J.S.1
Radosavac, S.2
-
3
-
-
24744432675
-
Self-policing mobile Ad-Hoc networks by reputation systems
-
10.1109/MCOM.2005.1470831
-
S. Buchegger J.-Y. Le Boudec 2009 Self-policing mobile Ad-Hoc networks by reputation systems IEEE Communications Magazine 43 7 101 107 10.1109/MCOM.2005.1470831
-
(2009)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
4
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
Lausanne, Switzerland, June 2002.
-
Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the CONFIDANT protocol. In Proceedings of 3rd ACM MobiHoc'02 (pp. 226-236). Lausanne, Switzerland, June 2002.
-
(2002)
Proceedings of 3rd ACM MobiHoc'02
, pp. 226-236
-
-
Buchegger, S.1
Boudec, L.2
J, -Y.3
-
5
-
-
54649085149
-
Graph similarity and distance in graphs
-
0889.05043 10.1007/s000100050025 1600596
-
G. Chartrand G. Kubicki M. Schultz 1998 Graph similarity and distance in graphs Aequationes Mathematicae 55 1-2 129 145 0889.05043 10.1007/s000100050025 1600596
-
(1998)
Aequationes Mathematicae
, vol.55
, Issue.12
, pp. 129-145
-
-
Chartrand, G.1
Kubicki, G.2
Schultz, M.3
-
6
-
-
33847681941
-
Convergence of the Lloyd algorithm for computing centroidal voronoi tessellations
-
DOI 10.1137/040617364
-
Q. Du M. Emelianenko L. Ju 2006 Convergence of the Lloyd algorithm for computing centroidal Voronoi tessellations SIAM Journal of Numerical Analysis 44 102 119 1115.65017 10.1137/040617364 2217374 (Pubitemid 46352064)
-
(2006)
SIAM Journal on Numerical Analysis
, vol.44
, Issue.1
, pp. 102-119
-
-
Du, Q.1
Emelianenko, M.2
Ju, L.3
-
7
-
-
0029716418
-
A sense of self for UNIX processes
-
Oakland, USA
-
Forrest, S., Hofmeyr, S. A., & Longstaff, T. A. (1996). A sense of self for UNIX processes. In Proceedings of IEEE Symposium on Security and Privacy (S&P'96) (pp. 120-128). Oakland, USA.
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy (S&P'96)
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Longstaff, T.A.3
-
9
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad hoc networks
-
Atlanta, USA, Mar.
-
He, Q., Wu, D., & Khosla, P. (2004). SORI: A secure and objective reputation-based incentive scheme for ad hoc networks. In Proceedings of IEEE WCNC'04 (pp. 825-830). Atlanta, USA, Mar.
-
(2004)
Proceedings of IEEE WCNC'04
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
11
-
-
4544258840
-
A cooperative intrusion detection system for ad hoc networks
-
Fairfax, Virginia, Oct., 2003.
-
Huang, Y., & Lee, W. (2003). A cooperative intrusion detection system for ad hoc networks. In Proceedings of the ACM Workshop On Security in Ad Hoc and Sensor Networks, Fairfax, Virginia, Oct., 2003.
-
(2003)
Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks
-
-
Huang, Y.1
Lee, W.2
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, USA, Aug., 2000.
-
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of 6th ACM MobiCom'00. (pp. 255-265). Boston, USA, Aug., 2000.
-
(2000)
Proceedings of 6th ACM MobiCom'00.
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
29244436370
-
Taxonomy of trust: Categorizing P2P reputation systems
-
DOI 10.1016/j.comnet.2005.07.011, PII S138912860500215X
-
S. Marti H. G. Molina 2006 Taxonomy of trust: Categorizing P2P reputation systems Computer Networks 50 472 484 1095.68557 10.1016/j.comnet.2005.07.011 (Pubitemid 41828401)
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 472-484
-
-
Marti, S.1
Garcia-Molina, H.2
-
15
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portoroz, Slovenia, Sept., 2002.
-
Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP Conference on Security Communications, and Multimedia (pp. 107-121). Portoroz, Slovenia, Sept., 2002.
-
(2002)
Proceedings of the 6th IFIP Conference on Security Communications, and Multimedia
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
16
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11, 48-60.
-
(2004)
IEEE Wireless Communications
, vol.11
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
17
-
-
33646706570
-
Securing wireless mesh networks
-
Apr., 2006.
-
Salem, B., & Hubaux, J.-P. (2006) Securing wireless mesh networks. IEEE Magaine on communication, pp. 50-55, Apr., 2006.
-
(2006)
IEEE Magaine on Communication
, pp. 50-55
-
-
Salem, B.1
Hubaux, J.-P.2
-
18
-
-
4444307562
-
Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single transceiver
-
May, 2004.
-
So, J., & Vaidya, N. (2004) Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single transceiver. In Proceedings of the 5th ACM MobiHoc'04 (pp. 222-233). May, 2004.
-
(2004)
Proceedings of the 5th ACM MobiHoc'04
, pp. 222-233
-
-
So, J.1
Vaidya, N.2
-
19
-
-
8344276670
-
A fair medium access control protocol for ad hoc networks with MIMO links
-
Mar., 2004.
-
Sundaresan, K. Sivakumar, R., Ingram, M. A. & Chang, T.-Y. (2004). A fair medium access control protocol for ad hoc networks with MIMO links. In Proceedings of INFOCOM (pp. 2559-2570). Mar., 2004.
-
(2004)
Proceedings of INFOCOM
, pp. 2559-2570
-
-
Sundaresan, K.1
Sivakumar, R.2
Ingram, M.A.3
Chang, T.-Y.4
-
20
-
-
84880858814
-
Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
-
May, 2002.
-
Tan, K. M. C., & Maxion, R. A. (2002). Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P'02), May, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P'02)
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
21
-
-
33750370441
-
DEMEM: Distributed evidence-driven message exchange intrusion detection model for MANET
-
Sept., 2006.
-
Tseng, C. H., Wang, S. -H., Ko, C. & Levitt, K. (2006). DEMEM: Distributed evidence-driven message exchange intrusion detection model for MANET. In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006) (pp. 249-271). Sept., 2006.
-
(2006)
Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006)
, pp. 249-271
-
-
Tseng, C.H.1
Ko, C.2
Levitt, K.3
-
22
-
-
84880467894
-
The EigenTrust algorithm for reputation management in P2P Networks
-
May, 2003.
-
Kamvar, S. D., Schlosser, M. T., & Molina, H. G. (2003). The EigenTrust algorithm for reputation management in P2P Networks. In Proceedings of the 12th International conference on World Wide Web (WWW'03). May, 2003.
-
(2003)
Proceedings of the 12th International Conference on World Wide Web (WWW'03).
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Molina, H.G.3
-
23
-
-
32144440287
-
Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
-
Aug., 2005.
-
Kodialam, M., & Nandagopal, T. (2005). Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In Proceedings of the 11th ACM MobiCom (pp. 73-87). Aug., 2005.
-
(2005)
Proceedings of the 11th ACM MobiCom
, pp. 73-87
-
-
Kodialam, M.1
Nandagopal, T.2
-
26
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
10.1023/A:1024600519144
-
Y. Zhang W. Lee Y. Huang 2003 Intrusion detection techniques for mobile wireless networks ACM Wireless Networks Journal 9 5 545 556 10.1023/A: 1024600519144
-
(2003)
ACM Wireless Networks Journal
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
27
-
-
78049530653
-
An observation-centric analysis on the modeling of anomaly-based intrusion detection
-
Z. Zhang H. Shen Y. Sang 2007 An observation-centric analysis on the modeling of anomaly-based intrusion detection International Journal of Network Security 4 3 292 305
-
(2007)
International Journal of Network Security
, vol.4
, Issue.3
, pp. 292-305
-
-
Zhang, Z.1
Shen, H.2
Sang, Y.3
-
28
-
-
70449515329
-
On achieving cost-sensitive anomaly detection and response in mobile Ad Hoc networks
-
June 2009 June 2009.
-
Zhang, Z., Ho, P-.H., & Naït-Abdesselam, F. (2009). On achieving cost-sensitive anomaly detection and response in mobile Ad Hoc networks, In Proceedings of IEEE International Conference on Communications (ICC'09)
-
(2009)
Proceedings of IEEE International Conference on Communications (ICC'09)
-
-
Zhang, Z.1
-
30
-
-
33845809712
-
Hermes a quantitative trust establishment framework for reliable data packet delivery in MANETs
-
C. Zouridaki B. L. Mark M. Hejmo R. K. Thomas 2007 Hermes a quantitative trust establishment framework for reliable data packet delivery in MANETs Journal of Computer Security 15 1 3 38
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 3-38
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
|