-
1
-
-
2342540625
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of service in sensor networks", IEEE Computer, pages 462,Oct. 2002.
-
(2002)
IEEE Computer
, pp. 462
-
-
Wood, A.1
Stankovic, J.2
-
3
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures" Ad Hoc Networks, 2003, vol. 1, no. 2-3, pp. 293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
24944560667
-
The new intrusion prevention and detection approaches for clustering-based sensor networks
-
C.-C. Su, K.-M. Chang, Y.-H. Kuo, and M.-F. Horng, "The new intrusion prevention and detection approaches for clustering-based sensor networks", in 2005 IEEE Wireless Communications and Networking Conference, WCNC.
-
2005 IEEE Wireless Communications and Networking Conference, WCNC
-
-
Su, C.-C.1
Chang, K.-M.2
Kuo, Y.-H.3
Horng, M.-F.4
-
5
-
-
18844454790
-
Intrusion detection in sensor networks: A non-cooperative game approach
-
August
-
A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks: A non-cooperative game approach", in 3rd IEEE International Symposium on Network Computing and Applications, (NCA 2004), Boston, MA, August 2004, pp. 343346.
-
(2004)
3rd IEEE International Symposium on Network Computing and Applications, (NCA 2004), Boston, MA
, pp. 343346
-
-
Agah, A.1
Das, S.2
Basu, K.3
Asadi, M.4
-
6
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
A. da Silva, M. Martins, B. Rocha, A. Loureiro,L. Ruiz, and H. Wong, "Decentralized intrusion detection in wireless sensor networks", 2005 , Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks.
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks
-
-
Da Silva, A.1
Martins, M.2
Rocha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.6
-
7
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", 2000, in: Proceedings of MOBICOM.
-
(2000)
Proceedings of MOBICOM
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
9
-
-
10644269064
-
-
Research Report RR-02-063, Institute Eurécom, France
-
P. Michiardi, R. Molva, "Prevention of denial of service attack and selfishness in mobile ad hoc networks", Research Report RR-02-063, 2002 , Institute Eurécom, France.
-
(2002)
Prevention of Denial of Service Attack and Selfishness in Mobile Ad Hoc Networks
-
-
Michiardi, P.1
Molva, R.2
-
10
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of terminodes
-
L. Blazevic, L. Buttyaan, S. Capkun, S. Giordano, J.P. Hubaux, J. LeBoudec, "Self-organization in mobile ad hoc networks: the approach of terminodes ", IEEE Communications Magazine 39 (6) (2001) 161-174.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.6
, pp. 161-174
-
-
Blazevic, L.1
Buttyaan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.P.5
LeBoudec, J.6
-
12
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
May
-
M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," in IEEE Trans. Mobile Computing, Vol. 5, May. 2006, pp. 1044-1049.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, pp. 1044-1049
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
13
-
-
17144395121
-
An analytical approach to the study of cooperation in wireless as hoc networks
-
March
-
V. Srinivasan, P. Nuggehalli, C. Chiasserini, and R. Rao, "An analytical approach to the study of cooperation in wireless as hoc networks," IEEE Transactions on Wireless Communcations, March 2005,vol. 4, pp. 722-733.
-
(2005)
IEEE Transactions on Wireless Communcations
, vol.4
, pp. 722-733
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.3
Rao, R.4
-
17
-
-
51749093355
-
Hit and Run: A Bayesian Game between Malicious and Regular Nodes in MANETs
-
F. Li and J. Wu, "Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs", IEEE SECON 2008, pp. 432-440.
-
IEEE SECON 2008
, pp. 432-440
-
-
Li, F.1
Wu, J.2
-
19
-
-
84874825833
-
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
-
Mar.
-
A. Patcha and J. Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks", in International Journal of Network Security, Mar. 2006, Vol.2, No.2, PP.131-137.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 131-137
-
-
Patcha, A.1
Park, J.2
-
20
-
-
34548187304
-
Study of Co-Operation among Selfish Neighbors in MANET under Evolutionary Game Theoretic Model
-
MIT Campus, Anna University, Chennai, India. Feb. 22-24
-
K. Komathy, P. Narayanasamy. "Study of Co-Operation among Selfish Neighbors in MANET under Evolutionary Game Theoretic Model". IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp.133-138.
-
(2007)
IEEE - ICSCN 2007
, pp. 133-138
-
-
Komathy, K.1
Narayanasamy, P.2
-
23
-
-
34548255006
-
-
Computer Science Department Florida State University. January 11
-
Jiangyi Hu. "Cooperation in Mobile Ad Hoc Networks". Computer Science Department Florida State University. January 11, 2005
-
(2005)
Cooperation in Mobile Ad Hoc Networks
-
-
Hu, J.1
|