-
1
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Feb.
-
Y. Sun, W. Yu, Z. Han, and K. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
-
(2006)
IEEE J. Selected Areas in Comm.
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.4
-
2
-
-
77950319889
-
Adaptation of reputation management systems to dynamic network conditions in ad hoc networks
-
May
-
M. Refaei, L. Da Silva, M. Eltoweissy, and T. Nadeem, "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks," IEEE Trans. Computers, vol. 59, no. 5, pp. 707-719, May 2010.
-
(2010)
IEEE Trans. Computers
, vol.59
, Issue.5
, pp. 707-719
-
-
Refaei, M.1
Da Silva, L.2
Eltoweissy, M.3
Nadeem, T.4
-
3
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
P. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A. Reninger, "Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control," Proc. 28th IEEE Symp. Security and Privacy, 2007.
-
(2007)
Proc. 28th IEEE Symp. Security and Privacy
-
-
Cheng, P.1
Rohatgi, P.2
Keser, C.3
Karger, P.4
Wagner, G.5
Reninger, A.6
-
4
-
-
38149125428
-
Cost-sensitive intrusion responses for mobile ad hoc networks
-
S. Wang, C. Tseng, K. Levitt, and M. Bishop, "Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks," Proc. 10th Int'l Symp. Recent Advances in Intrusion Detection (RAID'07), pp. 127-145, 2007.
-
(2007)
Proc. 10th Int'l Symp. Recent Advances in Intrusion Detection (RAID'07)
, pp. 127-145
-
-
Wang, S.1
Tseng, C.2
Levitt, K.3
Bishop, M.4
-
6
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
DOI 10.2753/MIS0742-1222220405
-
L. Sun, R. Srivastava, and T. Mock, "An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions," J. Management Information Systems, vol. 22, no. 4, pp. 109-142, 2006. (Pubitemid 44377673)
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
7
-
-
57049181381
-
Online risk assessment of intrusion scenarios using d-s evidence theory
-
C. Mu, X. Li, H. Huang, and S. Tian, "Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory," Proc. 13th European Symp. Research in Computer Security (ESORICS'08), pp. 35-48, 2008.
-
(2008)
Proc. 13th European Symp. Research in Computer Security (ESORICS'08)
, pp. 35-48
-
-
Mu, C.1
Li, X.2
Huang, H.3
Tian, S.4
-
9
-
-
0003146466
-
Review of a mathematical theory of evidence
-
L. Zadeh, "Review of a Mathematical Theory of Evidence," AI Magazine, vol. 5, no. 3, p. 81, 1984.
-
(1984)
AI Magazine
, vol.5
, Issue.3
, pp. 81
-
-
Zadeh, L.1
-
10
-
-
0023311178
-
On the dempster-shafer framework and new combination rules
-
DOI 10.1016/0020-0255(87)90007-7
-
R. Yager, "On the Dempster-Shafer Framework and New Combination Rules 1," Information Sciences, vol. 41, no. 2, pp. 93-137, 1987. (Pubitemid 17583474)
-
(1987)
Information sciences
, vol.41
, Issue.2
, pp. 93-137
-
-
Yager Ronald, R.1
-
11
-
-
0036051055
-
Sensor fusion using dempster-shafer theory
-
H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor Fusion Using Dempster-Shafer Theory," Proc. IEEE Instrumentation and Measurement Technology Conf., vol. 1, pp. 7-12, 2002.
-
(2002)
Proc. IEEE Instrumentation and Measurement Technology Conf.
, vol.1
, pp. 7-12
-
-
Wu, H.1
Siegel, M.2
Stiefelhagen, R.3
Yang, J.4
-
13
-
-
4544384608
-
Ad hoc on-demand distance vector routing
-
C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector Routing," Mobile Ad-Hoc Network Working Group, vol. 3561, 2003.
-
(2003)
Mobile Ad-hoc Network Working Group
, vol.3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
14
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
DOI 10.1109/MCOM.2002.1039859
-
H. Deng, W. Li, and D. Agrawal, "Routing Security in Wireless Ad Hoc Networks," IEEE Comm. Magazine, vol. 40, no. 10, pp. 70-75, Oct. 2002. (Pubitemid 35311948)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
15
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May/June
-
Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy Magazine, vol. 2, no. 3, pp. 28-39, May/June 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
16
-
-
36849079903
-
A survey of routing attacks in mobile ad hoc networks
-
DOI 10.1109/MWC.2007.4396947
-
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A Survey of Routing Attacks in Mobile Ad Hoc Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85-91, Oct. 2007. (Pubitemid 350231658)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 85-91
-
-
Kannhavong, B.1
Nakayama, H.2
Nemoto, Y.3
Kato, N.4
Jamalipour, A.5
-
17
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Networks, vol. 1, nos. 2/3, pp. 293-315, 2003. (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
21
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, no. 1, pp. 21-38, 2005. (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
22
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
B. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP'02), pp. 78-88, 2002.
-
(2002)
Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP'02)
, pp. 78-88
-
-
Levine, B.1
Shields, C.2
Belding-Royer, E.3
-
23
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
DOI 10.1016/S1570-8705(03)00019-2
-
Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003. (Pubitemid 40421401)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
24
-
-
39149117709
-
ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks," ACM Trans. Information and System Security, vol. 10, no. 4, pp. 1-35, 2008.
-
(2008)
ACM Trans. Information and System Security
, vol.10
, Issue.4
, pp. 1-35
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
25
-
-
33750370441
-
DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
C. Tseng, S. Wang, C. Ko, and K. Levitt, "DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for Manet," Proc. Ninth Int'l Symp. Recent Advances in Intrusion Detection (RAID'06), pp. 249-271, 2006. (Pubitemid 44617856)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 249-271
-
-
Tseng, C.H.1
Wang, S.-H.2
Ko, C.3
Levitt, K.4
-
26
-
-
33745657261
-
A specification-based intrusion detection model for OLSR
-
DOI 10.1007/11663812-17, Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers
-
C. Tseng, T. Song, P. Balasubramanyam, C. Ko, and K. Levitt, "A Specification-Based Intrusion Detection Model for OLSR," Proc. Ninth Int'l Symp. Recent Advances in Intrusion Detection (RAID'06), pp. 330-350, 2006. (Pubitemid 43973735)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3858
, pp. 330-350
-
-
Tseng, C.H.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.5
-
27
-
-
78649356481
-
Mechanism design-based secure leader election model for intrusion detection in MANET
-
Jan./Feb
-
N. Mohammed, H. Otrok, L. Wang, M. Debbabi, and P. Bhattacharya, "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 1, pp. 89-103, Jan./Feb. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.1
, pp. 89-103
-
-
Mohammed, N.1
Otrok, H.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
28
-
-
78751671554
-
Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA
-
Mar./Apr
-
J. Felix, C. Joseph, B.-S. Lee, A. Das, and B. Seet, "Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 2, pp. 233-245, Mar./Apr. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.2
, pp. 233-245
-
-
Felix, J.1
Joseph, C.2
Lee, B.-S.3
Das, A.4
Seet, B.5
-
29
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, 2000. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti Sergio1
Giuli, T.J.2
Lai Kevin3
Baker Mary4
-
30
-
-
34247485223
-
Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method
-
S. Kurosawa, H. Nakayama, N. Kato, and A. Jamalipour, "Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method," Int'l J. Network Security, vol. 105, no. 627, pp. 65-68, 2006.
-
(2006)
Int'l J. Network Security
, vol.105
, Issue.627
, pp. 65-68
-
-
Kurosawa, S.1
Nakayama, H.2
Kato, N.3
Jamalipour, A.4
-
31
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, vol. 3, pp. 1976-1986, 2004.
-
(2004)
Proc. IEEE INFOCOM
, vol.3
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
33
-
-
77952350259
-
Intrusion response cost assessment methodology
-
C. Strasburg, N. Stakhanova, S. Basu, and J. Wong, "Intrusion Response Cost Assessment Methodology," Proc. Fourth ACM Symp. Information, Computer, and Comm. Security (ASIACCS'09), pp. 388-391, 2009.
-
(2009)
Proc. Fourth ACM Symp. Information, Computer, and Comm. Security (ASIACCS'09)
, pp. 388-391
-
-
Strasburg, C.1
Stakhanova, N.2
Basu, S.3
Wong, J.4
-
34
-
-
0242456725
-
Dynamic and risk-aware network access management
-
L. Teo, G. Ahn, and Y. Zheng, "Dynamic and Risk-Aware Network Access Management," Proc. Eighth ACM Symp. Access Control Models and Technologies (SACMAT'03), pp. 217-230, 2003.
-
(2003)
Proc. Eighth ACM Symp. Access Control Models and Technologies (SACMAT'03)
, pp. 217-230
-
-
Teo, L.1
Ahn, G.2
Zheng, Y.3
|