메뉴 건너뛰기




Volumn 71, Issue 9, 2011, Pages 1249-1260

GRAP: Grey risk assessment based on projection in ad hoc networks

Author keywords

Ad hoc networks; Grey prediction; Grey relational projection; Risk assessment

Indexed keywords

DATA-COMMUNICATION; DYNAMIC TOPOLOGIES; FLEXIBLE CHARACTERISTICS; GREY DECISION MAKING; GREY PREDICTION; GREY RELATIONAL PROJECTION; INCOMPLETE INFORMATION; NUMBER OF SAMPLES; OPEN ACCESS; RISK ASSESSMENT METHODS; WIRELESS CHANNEL;

EID: 79960135866     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2010.11.012     Document Type: Article
Times cited : (27)

References (42)
  • 8
    • 64049107478 scopus 로고    scopus 로고
    • E-Hermes: A robust cooperative trust establishment scheme for mobile Ad Hoc netwroks
    • Z. Charikleia, L.M. Brian, H. Marek, and K.T. Roshan E-Hermes: a robust cooperative trust establishment scheme for mobile Ad Hoc netwroks Ad Hoc Networks 7 2009 1156 1168
    • (2009) Ad Hoc Networks , vol.7 , pp. 1156-1168
    • Charikleia, Z.1    Brian, L.M.2    Marek, H.3    Roshan, K.T.4
  • 9
    • 0010344835 scopus 로고    scopus 로고
    • A distributed trust model for peer-to-peer networks [R]
    • R. Chen, Poblano Yeager W., A distributed trust model for peer-to-peer networks [R], Sun Microsystems, 2000.
    • (2000) Sun Microsystems
    • Chen, R.1    Poblano Yeager, W.2
  • 10
    • 78650018245 scopus 로고    scopus 로고
    • Undulating grey model (UGM)GM(1, 1 | tan (k - τ) p, sin (k - τ) p)
    • Julong Deng Undulating grey model (UGM)GM(1, 1 | tan (k - τ) p, sin (k - τ) p) The Journal of Grey System 13 3 2001 201 205
    • (2001) The Journal of Grey System , vol.13 , Issue.3 , pp. 201-205
    • Deng, J.1
  • 11
    • 70849089410 scopus 로고    scopus 로고
    • A novel grey model GM(1, 1 | τ, r): Generalizing GM(1, 1)
    • Julong Deng A novel grey model GM(1, 1 | τ, r): generalizing GM(1, 1) The Journal of Grey System 13 1 2001 1 8
    • (2001) The Journal of Grey System , vol.13 , Issue.1 , pp. 1-8
    • Deng, J.1
  • 12
    • 50849151631 scopus 로고
    • Control problems of grey systems
    • Julong Deng Control problems of grey systems Systems and Control Letters 5 1982 288 294
    • (1982) Systems and Control Letters , vol.5 , pp. 288-294
    • Deng, J.1
  • 15
    • 65349136942 scopus 로고    scopus 로고
    • Incomplete information nodes risk assessment in mobile ad hoc networks
    • Cai Fu, and Liang Hong Incomplete information nodes risk assessment in mobile ad hoc networks Chinese Journal of Computer 32 4 2009 805 815
    • (2009) Chinese Journal of Computer , vol.32 , Issue.4 , pp. 805-815
    • Fu, C.1    Hong, L.2
  • 16
    • 33645777447 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks based on a bidirectional trust model
    • Cai Fu, and Fan Hong Self-organized public-key management for mobile ad hoc networks based on a bidirectional trust model Wuhan University Journal of Natural Science 1,11 1 2006 1188 1189
    • (2006) Wuhan University Journal of Natural Science , vol.111 , Issue.1 , pp. 1188-1189
    • Fu, C.1    Hong, F.2
  • 20
    • 66349134399 scopus 로고    scopus 로고
    • Mitigation of the effects of selfish and malicious nodes in Ad-Hoc networks
    • H. Hallani, and S.A. Shahrestani Mitigation of the effects of selfish and malicious nodes in Ad-Hoc networks WSEAS Transactions on Computers 8 2 2009 205 221
    • (2009) WSEAS Transactions on Computers , vol.8 , Issue.2 , pp. 205-221
    • Hallani, H.1    Shahrestani, S.A.2
  • 22
    • 78650660068 scopus 로고    scopus 로고
    • Security weakness in MANET
    • Bell Labs, January 2001
    • M. Jacobson, S. Wetzel, Security weakness in MANET, Technical Report, Bell Labs, January 2001.
    • Technical Report
    • Jacobson, M.1    Wetzel, S.2
  • 23
    • 0242719010 scopus 로고    scopus 로고
    • Trust based decision making for electronic transactions
    • L. Yngstrom, T. Svensson, Stockholm University Press Kista
    • A. Jøsang Trust based decision making for electronic transactions L. Yngstrom, T. Svensson, Proceedings of the 4th Nordic Workshop on Secure Computer Systems 1999 Stockholm University Press Kista 1 21
    • (1999) Proceedings of the 4th Nordic Workshop on Secure Computer Systems , pp. 1-21
    • Jøsang, A.1
  • 24
    • 67650720681 scopus 로고    scopus 로고
    • A trust model based on fuzzy recommendation for mobile Ad-Hoc networks
    • Luo Junhai, Liu Xue, and Fan Mingyu A trust model based on fuzzy recommendation for mobile Ad-Hoc networks Computer Networks 53 2009 2396 2407
    • (2009) Computer Networks , vol.53 , pp. 2396-2407
    • Junhai, L.1    Xue, L.2    Mingyu, F.3
  • 26
    • 25844471287 scopus 로고    scopus 로고
    • Constructing internet coordinate system based on delay measurement
    • H. Lim, J.C. Hou, C. Choi, Constructing internet coordinate system based on delay measurement, in: Proc. of the 3rd ACM IMC, 2003, pp. 129142.
    • (2003) Proc. of the 3rd ACM IMC , pp. 129142
    • Lim, H.1    Hou, J.C.2    Choi, C.3
  • 29
    • 63049099708 scopus 로고    scopus 로고
    • Reliable and fully distributed trust model for mobile ad hoc networks
    • O. Mawloud, C. Yacine, and B. Abdelmadjid Reliable and fully distributed trust model for mobile ad hoc networks Computer & Security 28 2009 199 214
    • (2009) Computer & Security , vol.28 , pp. 199-214
    • Mawloud, O.1    Yacine, C.2    Abdelmadjid, B.3
  • 31
    • 0242439292 scopus 로고    scopus 로고
    • Research of subjective trust management model based on the fuzzy set theory
    • W Tang, and Z. Chen Research of subjective trust management model based on the fuzzy set theory Chinese Journal of Software 14 8 2003 1401 1408
    • (2003) Chinese Journal of Software , vol.14 , Issue.8 , pp. 1401-1408
    • Tang, W.1    Chen, Z.2
  • 36
    • 3142738238 scopus 로고    scopus 로고
    • Peer trust: Supporting reputation based trust in peer to peer communities
    • IEEE Transactions on Data and Knowledge Engineering (special issue)
    • L. Xiong, and L. Liu Peer trust: supporting reputation based trust in peer to peer communities Peer to Peer Based Data Management IEEE Transactions on Data and Knowledge Engineering 16 7 2004 843 857 (special issue)
    • (2004) Peer to Peer Based Data Management , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 39
    • 51249121100 scopus 로고    scopus 로고
    • Modeling and managing the trust for wireless and mobile ad hoc networks
    • Ren Yonglin, Boukerche Azzedine, Modeling and managing the trust for wireless and mobile ad hoc networks, in: IEEE International Conference on Communications, 2008, pp. 21292133.
    • (2008) IEEE International Conference on Communications , pp. 21292133
    • Yonglin, R.1    Azzedine, B.2
  • 41
  • 42
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Li-dong Zhou, and Zygmunt J. Haas Securing ad hoc networks IEEE Network 13 1999 24 29
    • (1999) IEEE Network , vol.13 , pp. 24-29
    • Zhou, L.-D.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.