-
1
-
-
61349151189
-
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
-
Feb.
-
M. Khabbazian, H. Mercier, and V. K. Bhargava, "Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 736-745, Feb. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.2
, pp. 736-745
-
-
Khabbazian, M.1
Mercier, H.2
Bhargava, V.K.3
-
2
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile Ad Hoc networks
-
DOI 10.1109/TWC.2006.1687761, 1687761
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Mask: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sep. 2006. (Pubitemid 44376150)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
3
-
-
35448965082
-
Two tier secure routing protocol for heterogeneous sensor networks
-
DOI 10.1109/TWC.2007.06095
-
X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Two-tier secure routing protocol for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3395-3401, Sep. 2007. (Pubitemid 47625218)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3395-3401
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
4
-
-
66449085294
-
A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks
-
Jun.
-
H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato, "A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2471-2481, Jun. 2009.
-
(2009)
IEEE Trans. Veh. Technol
, vol.58
, Issue.5
, pp. 2471-2481
-
-
Nakayama, H.1
Kurosawa, S.2
Jamalipour, A.3
Nemoto, Y.4
Kato, N.5
-
5
-
-
65949087881
-
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
-
Apr.
-
M. Yu and K. K. Leung, "A trustworthiness-based QoS routing protocol for wireless ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1888-1898, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.4
, pp. 1888-1898
-
-
Yu, M.1
Leung, K.K.2
-
6
-
-
57949111587
-
Reliable routing in networks with generalized link failure events
-
Dec.
-
S. Stefanakos, "Reliable routing in networks with generalized link failure events," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1331-1339, Dec. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1331-1339
-
-
Stefanakos, S.1
-
7
-
-
0036986441
-
An on-demand secure routing protocol resilient to Byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to Byzantine failures," in Proc. ACM Wise, 2002, pp. 21-30.
-
(2002)
Proc. ACM Wise
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
8
-
-
34548305267
-
Reliable broadcast in wireless networks with probabilistic failures
-
DOI 10.1109/INFCOM.2007.89, 4215671, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
V. Bhandari and N. H. Vaidya, "Reliable broadcast in wireless networks with probabilistic failures," in Proc. INFOCOM, 2007, pp. 715-723. (Pubitemid 47334289)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 715-723
-
-
Bhandari, V.1
Vaidya, N.H.2
-
9
-
-
36048943071
-
R-sentry: Providing continuous sensor services against random node failures
-
DOI 10.1109/DSN.2007.79, 4272975, Proceedings - 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007
-
S. Yu and Y. Zhang, "R-sentry: Providing continuous sensor services against random node failures," in Proc. 37th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2007, pp. 235-244. (Pubitemid 350080429)
-
(2007)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 235-244
-
-
Yu, S.1
Zhang, Y.2
-
10
-
-
34247184576
-
Fast local rerouting for handling transient link failures
-
DOI 10.1109/TNET.2007.892851
-
S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang, and C.-N. Chuah, "Fast local rerouting for handling transient link failures," IEEE/ACM Trans. Netw., vol. 15, no. 2, pp. 359-372, Apr. 2007. (Pubitemid 46621616)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.2
, pp. 359-372
-
-
Nelakuditi, S.1
Lee, S.2
Yu, Y.3
Zhang, Z.-L.4
Chuah, C.-N.5
-
11
-
-
57949094926
-
Bandwidth guaranteed routing with fast restoration against link and node failures
-
Dec.
-
R. S. Bhatia, M. Kodialam, T. V. Lakshman, and S. Sengupta, "Bandwidth guaranteed routing with fast restoration against link and node failures," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1321-1330, Dec. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1321-1330
-
-
Bhatia, R.S.1
Kodialam, M.2
Lakshman, T.V.3
Sengupta, S.4
-
12
-
-
77953310884
-
On the feasibility and efficiency of protection routing in IP networks
-
K.-W. Kwong, L. Gao, R. Guerin, and Z.-L. Zhang, "On the feasibility and efficiency of protection routing in IP networks," in Proc. INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. INFOCOM
, pp. 1-9
-
-
Kwong, K.-W.1
Gao, L.2
Guerin, R.3
Zhang, Z.-L.4
-
13
-
-
77953300333
-
Designing low-capacity backup networks for fast restoration
-
R. Banner and A. Orda, "Designing low-capacity backup networks for fast restoration," in Proc. INFOCOM, 2010, pp. 1864-1872.
-
(2010)
Proc. INFOCOM
, pp. 1864-1872
-
-
Banner, R.1
Orda, A.2
-
14
-
-
82855161719
-
Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack
-
Congressional EMP Commission, McLean, VA, Apr.
-
J. S. Foster, Jr., E. Gjelde, W. R. Graham, R. J. Hermann, H. M. Kluepfel, R. L. Lawson, G. K. Soper, L. L.Wood, Jr., and J. B.Woodard, "Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack," Congressional EMP Commission, McLean, VA, Apr. 2004, Volume 1: Executive Report.
-
(2004)
Executive Report
-
-
Foster Jr., J.S.1
Gjelde, E.2
Graham, W.R.3
Hermann, R.J.4
Kluepfel, H.M.5
Lawson, R.L.6
Soper, G.K.7
Wood Jr., L.L.8
Woodard, J.B.9
-
16
-
-
39049126617
-
Fault-tolerance in sensor networks: A new evaluation metric
-
A. Sen, B. H. Shen, L. Zhou, and B. Hao, "Fault-tolerance in sensor networks: A new evaluation metric," in Proc. INFOCOM, 2006, pp. 1-12.
-
(2006)
Proc. INFOCOM
, pp. 1-12
-
-
Sen, A.1
Shen, B.H.2
Zhou, L.3
Hao, B.4
-
17
-
-
74949099389
-
Region-based connectivity: A new paradigm for design of fault-tolerant networks
-
Paris, France
-
A. Sen, S. Murthy, and S. Banerjee, "Region-based connectivity: A new paradigm for design of fault-tolerant networks," in Proc. 15th Int. Conf. High Performance Switching Routing, Paris, France, 2009, pp. 94-100.
-
(2009)
Proc. 15th Int. Conf. High Performance Switching Routing
, pp. 94-100
-
-
Sen, A.1
Murthy, S.2
Banerjee, S.3
-
18
-
-
77949646009
-
Impact of regionbased faults on the connectivity of wireless networks
-
Monticello, IL
-
A. Sen, S. Banerjee, P. Ghosh, and S. Shirazipourazad, "Impact of regionbased faults on the connectivity of wireless networks," in Proc. 47th Annu. Allerton Conf. Commun., Control, Comput., Monticello, IL, 2009, pp. 1430-1437.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1430-1437
-
-
Sen, A.1
Banerjee, S.2
Ghosh, P.3
Shirazipourazad, S.4
-
19
-
-
62349108771
-
Assessing the vulnerability of geographically correlated network failures
-
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of geographically correlated network failures," in Proc. MILCOM, 2008, pp. 1-6.
-
(2008)
Proc. MILCOM
, pp. 1-6
-
-
Neumayer, S.1
Zussman, G.2
Cohen, R.3
Modiano, E.4
-
20
-
-
70349686850
-
Assessing the vulnerability of the fiber infrastructure to disasters
-
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of the fiber infrastructure to disasters," in Proc. INFOCOM, 2009, pp. 1566-1574.
-
(2009)
Proc. INFOCOM
, pp. 1566-1574
-
-
Neumayer, S.1
Zussman, G.2
Cohen, R.3
Modiano, E.4
-
21
-
-
77953317622
-
Network reliability with geographically correlated failures
-
S. Neumayer and E. Modiano, "Network reliability with geographically correlated failures," in Proc. INFOCOM, 2010, pp. 1658-1666.
-
(2010)
Proc. INFOCOM
, pp. 1658-1666
-
-
Neumayer, S.1
Modiano, E.2
-
22
-
-
79951651475
-
Dynamic load balancing for robust distributed computing in the presence of topological impairments
-
Hoboken, NJ: Wiley
-
M. M. Hayat, J. E. Pezoa, D. Dietz, and S. Dhakal, "Dynamic load balancing for robust distributed computing in the presence of topological impairments," in Handbook of Science and Technology for Homeland Security. Hoboken, NJ: Wiley, 2009.
-
(2009)
Handbook of Science and Technology for Homeland Security
-
-
Hayat, M.M.1
Pezoa, J.E.2
Dietz, D.3
Dhakal, S.4
-
23
-
-
70350131484
-
Topology design of undersea cables considering survivability under major disasters
-
W. Wu, B. Moran, J. Manton, and M. Zukerman, "Topology design of undersea cables considering survivability under major disasters," in Proc. WAINA, 2009, pp. 1154-1159.
-
(2009)
Proc. WAINA
, pp. 1154-1159
-
-
Wu, W.1
Moran, B.2
Manton, J.3
Zukerman, M.4
-
24
-
-
79551631221
-
Assessing the impact of geographically correlated failures on overlay-based data dissemination
-
K. Kim and N. Venkatasabramanian, "Assessing the impact of geographically correlated failures on overlay-based data dissemination," in Proc. GLOBECOM, 2010, pp. 1-5.
-
(2010)
Proc. GLOBECOM
, pp. 1-5
-
-
Kim, K.1
Venkatasabramanian, N.2
-
25
-
-
79951617247
-
Network vulnerability to single, multiple, and probabilistic physical attacks
-
P. Agarwal, A. Efrat, S. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "Network vulnerability to single, multiple, and probabilistic physical attacks," in Proc. MILCOM, 2010, pp. 1824-1829.
-
(2010)
Proc. MILCOM
, pp. 1824-1829
-
-
Agarwal, P.1
Efrat, A.2
Ganjugunte, S.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
26
-
-
79960864959
-
The resilience of WDM networks to probabilistic geographical failures
-
to be published
-
P. Agarwal, A. Efrat, S. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "The resilience of WDM networks to probabilistic geographical failures," in Proc. INFOCOM, 2011, to be published.
-
(2011)
Proc. INFOCOM
-
-
Agarwal, P.1
Efrat, A.2
Ganjugunte, S.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
27
-
-
77953309818
-
Charactering the spread of correlated failures in large wireless networks
-
Y. Xu and W. Wang, "Charactering the spread of correlated failures in large wireless networks," in Proc. INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. INFOCOM
, pp. 1-9
-
-
Xu, Y.1
Wang, W.2
-
28
-
-
78649281113
-
Data preservation under spatial failures in sensor networks
-
N. H. Azimi, X. Hou, H. Gupta, and J. Gao, "Data preservation under spatial failures in sensor networks," in Proc. MOBIHOC, 2010, pp. 171-180.
-
(2010)
Proc. MOBIHOC
, pp. 171-180
-
-
Azimi, N.H.1
Hou, X.2
Gupta, H.3
Gao, J.4
-
29
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Sep.
-
Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: A survey," IEEE Commun. Surveys Tuts., vol. 10, no. 3, pp. 6-28, Sep. 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
30
-
-
77957671484
-
Analysis of attack models via unified modeling language in wireless sensor networks: A survey study
-
S. Hong and S. Lim, "Analysis of attack models via unified modeling language in wireless sensor networks: A survey study," in Proc. WCNIS, 2010, pp. 692-696.
-
(2010)
Proc. WCNIS
, pp. 692-696
-
-
Hong, S.1
Lim, S.2
-
31
-
-
33746192198
-
A Graph-theoretic perspective on centrality
-
DOI 10.1016/j.socnet.2005.11.005, PII S0378873305000833
-
S. P. Borgattia and M. G. Everett, "A graph-theoretic perspective on centrality," Social Netw., vol. 28, no. 4, pp. 466-484, Oct. 2006. (Pubitemid 44089303)
-
(2006)
Social Networks
, vol.28
, Issue.4
, pp. 466-484
-
-
Borgatti, S.P.1
Everett, M.G.2
-
32
-
-
37349097109
-
Comparative approaches for assessing network vulnerability
-
DOI 10.1177/0160017607308679
-
T. H. Grubesic, T. C. Matisziw, A. T. Murray, and D. Snediker, "Comparative approaches for assessing network vulnerability," Int. Reg. Sci. Rev., vol. 31, no. 1, pp. 88-112, Jan. 2008. (Pubitemid 350284149)
-
(2008)
International Regional Science Review
, vol.31
, Issue.1
, pp. 88-112
-
-
Grubesic, T.H.1
Matisziw, T.C.2
Murray, A.T.3
Snediker, D.4
-
33
-
-
56349137799
-
Multimethodological approaches to network vulnerability analysis
-
A. T. Murray, T. C. Matisziw, and T. H. Grubesic, " Multimethodological approaches to network vulnerability analysis," Growth Change, vol. 39, no. 4, pp. 573-592, 2008.
-
(2008)
Growth Change
, vol.39
, Issue.4
, pp. 573-592
-
-
Murray, A.T.1
Matisziw, T.C.2
Grubesic, T.H.3
-
34
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
DOI 10.1111/j.1467-8306.2004.00410.x
-
R. L. Church, M. P. Scaparra, and R. S. Middleton, "Identifying critical infrastructure the median and covering facility interdiction problems," Ann. Assoc. Amer. Geographers, vol. 94, no. 3, pp. 491-502, Sep. 2004. (Pubitemid 41716604)
-
(2004)
Annals of the Association of American Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
35
-
-
84883856631
-
Partitioning avoidance in mobile ad hoc networks using network survivability concepts
-
D. Goyal and J. J. Caffery, "Partitioning avoidance in mobile ad hoc networks using network survivability concepts," in Proc. 7th Int. Symp. Comput. Commun., 2002, pp. 553-558.
-
(2002)
Proc. 7th Int. Symp. Comput. Commun
, pp. 553-558
-
-
Goyal, D.1
Caffery, J.J.2
-
36
-
-
84881028021
-
Partition detection in mobile ad hoc networks using multiple disjoint paths set
-
Mahdia, Tunisia
-
M. Hauspie, J. Carle, and D. Simplot, "Partition detection in mobile ad hoc networks using multiple disjoint paths set," in Proc. 2nd IFIP MEDHOC- NET Workshop, Mahdia, Tunisia, 2003, pp. 25-27.
-
(2003)
Proc. 2nd IFIP MEDHOC- NET Workshop
, pp. 25-27
-
-
Hauspie, M.1
Carle, J.2
Simplot, D.3
-
37
-
-
37049017424
-
Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks
-
M. Jorgic, I. Stojmenovic, M. Hauspie, and D. Simplot-ryl, "Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks," in Proc. 3rd IFIP MED-HOC-NET Workshop, 2004, pp. 360-371.
-
(2004)
Proc. 3rd IFIP MED-HOC-NET Workshop
, pp. 360-371
-
-
Jorgic, M.1
Stojmenovic, I.2
Hauspie, M.3
Simplot-Ryl, D.4
-
38
-
-
77953295879
-
On approximation of new optimization methods for assessing network vulnerability
-
T. N. Dinh, Y. Xuan,M. T. Thai, E. K. Park, and T. Znati, "On approximation of new optimization methods for assessing network vulnerability," in Proc. INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. INFOCOM
, pp. 1-9
-
-
Dinh, T.N.1
Xuanm. T Thai, Y.2
Park, E.K.3
Znati, T.4
|