-
1
-
-
65949118246
-
A trust based clustering framework for securing ad hoc networks
-
Ghaziabad, India CCIS 31
-
P Chatterjee, I. Sengupta, and S. K. Ghosh, A Trust Based Clustering Framework for Securing Ad Hoc Networks, in Proc. of ICISTM 2009, Ghaziabad, India, 2009. CCIS 31, pp. 313-324.
-
(2009)
Proc. of ICISTM 2009
, pp. 313-324
-
-
Chatterjee, P.1
Sengupta, I.2
Ghosh, S.K.3
-
2
-
-
1342306709
-
Security for cluster based ad hoc networks
-
Varadharajan et al, Security for cluster based ad hoc networks, in: Proc. of Computer Communications 27 (2004), pp. 488-501.
-
(2004)
Proc. of Computer Communications
, vol.27
, pp. 488-501
-
-
Varadharajan1
-
3
-
-
40249091644
-
Trust and mobility-based clustering algorithm for Secure mobile ad hoc networks
-
October 29 -November 03 ICSNC. IEEE Computer Society, Washington, DC
-
Rachedi et al, Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks' in: Proc. of the international Conference on Systems and Networks Communication (October 29 -November 03, 2006). ICSNC. IEEE Computer Society, Washington, DC, 72.
-
(2006)
Proc. of the International Conference on Systems and Networks Communication
, pp. 72
-
-
Rachedi1
-
7
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L. and Haas, Z. J., Securing Ad Hoc Networks, in: IEEE Network Magazine, 13(6), 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
12
-
-
84994155710
-
A distributed trust model
-
Langdale, Cumbria, United Kingdom
-
Rahman, A. A. and Hailes, S., A Distributed Trust Model, in: Proc. of the ACM New Security Paradigms Workshop, Langdale, Cumbria, United Kingdom, 1997, pp. 48-60.
-
(1997)
Proc. of the ACM New Security Paradigms Workshop
, pp. 48-60
-
-
Rahman, A.A.1
Hailes, S.2
-
15
-
-
33745257035
-
Quantifying trust in mobile ad hoc networks
-
Waltham USA, April 18-21
-
Virendra et al, Quantifying trust in Mobile ad hoc networks, in: Proc. of KIMAS 2005, Waltham USA, April 18-21.
-
Proc. of KIMAS 2005
-
-
Virendra1
-
16
-
-
0034592696
-
Leader election algorithms for mobile ad hoc networks
-
Boston, MA, August
-
N. Malpani, J. Welch and N. Vaidya, Leader Election Algorithms for Mobile Ad Hoc Networks. in: Proc. of 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Boston, MA, August 2000.
-
(2000)
Proc. of 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
-
-
Malpani, N.1
Welch, J.2
Vaidya, N.3
-
17
-
-
79952569372
-
Leader election algorithms for wireless ad hoc networks
-
Sudarshan Vasudevan, Brian Decleene, Neil Immerman, Jim Kurose, Don Towsley, Leader Election Algorithms for Wireless Ad Hoc Networks in: Proc. of DARPA Information Survivability Conference and Exposition, 2003.
-
(2003)
Proc. of DARPA Information Survivability Conference and Exposition
-
-
Vasudevan, S.1
Decleene, B.2
Immerman, N.3
Kurose, J.4
Towsley, D.5
-
18
-
-
0033742222
-
A signal detection system based on dempster-shafer theory and comparison to fuzzy detection
-
February
-
J. R. Boston, A Signal Detection System Based on Dempster-Shafer Theory and Comparison to Fuzzy Detection, in: IEEE Transactions on Systems, Man, and Cybernetics, Part C, Applications and Reviews, Volume 30, Issue 1, February 2000.
-
(2000)
IEEE Transactions on Systems, Man, and Cybernetics, Part C, Applications and Reviews
, vol.30
, Issue.1
-
-
Boston, J.R.1
-
19
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless ad hoc networks
-
V. Gupta, S. V. Krishnamurthy, and M. Faloutsos, Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, in: Proc. of MILCOM, 2002.
-
(2002)
Proc. of MILCOM
-
-
Gupta, V.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
22
-
-
33745403778
-
Defending against wormhole attacks
-
W. Wang, B. Bhargava, Y. Lu, and X. Wu, Defending against Wormhole Attacks, in: Mobile Ad Hoc Networks, WCMC, 2006 vol. 6, issue 4, pp.483-503.
-
(2006)
Mobile Ad Hoc Networks, WCMC
, vol.6
, Issue.4
, pp. 483-503
-
-
Wang, W.1
Bhargava, B.2
Lu, Y.3
Wu, X.4
-
25
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures, in: Proc. of the ACM Workshop on Wireless Security, pp. 21-30.
-
Proc. of the ACM Workshop on Wireless Security
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
26
-
-
34250369377
-
-
Dept.of Comp Sc. and Engg, Florida, Atlanta university
-
Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, A survey of attacks and counter measures in mobile ad hoc networks, Dept.of Comp Sc. and Engg, Florida, Atlanta university. http://student.fau.edu/jchen8/web/SurveyBookchapter.pdf
-
A Survey of Attacks and Counter Measures in Mobile Ad Hoc Networks
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
27
-
-
11244333253
-
Trust evaluation in ad-hoc networks
-
Philadelphia, PA, USA
-
Theodorakopoulos, George and Baras, John S., Trust evaluation in ad-hoc networks, in: Proc. of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004, pp. 1-10.
-
(2004)
Proc. of the 3rd ACM Workshop on Wireless Security
, pp. 1-10
-
-
George, T.1
Baras John, S.2
-
28
-
-
79951799206
-
NS-2: The network simulator
-
NS-2: The Network Simulator, UC Berkeley, http://www.isi.edu/nsnam/ns.
-
UC Berkeley
-
-
|