-
2
-
-
85181109295
-
-
9th ACIS International Conference on Software Engineering, Artificially Intelligence, Networking and Parallel/Distributed Computing
-
Naseer, S., M. Younus, and A. Ahmed. Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A survey. 9th ACIS International Conference on Software Engineering, Artificially Intelligence, Networking and Parallel/Distributed Computing, 2008.
-
(2008)
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey
-
-
Naseer, S.1
Younus, M.2
Ahmed, A.3
-
3
-
-
85181149812
-
-
th Annual Southeast Regional Conference, Melbourne, Florida, USA
-
th Annual Southeast Regional Conference, Melbourne, Florida, USA, 2006.
-
(2006)
Security Issues In Privacy and Key Management Protocols of IEEE 802.16
-
-
Xu, S.1
Matthews, M.2
Huang, C.T.3
-
5
-
-
85181115292
-
-
Auswireless Conference
-
[5] Pang, D., L. Tian, J. Hu, J. Zhou and J. Shi. Overview and Analysis of IEEE 802.16e Security, Auswireless Conference 2006. URI: http://hdl.handle.net/2100/172.
-
(2006)
Overview and Analysis of IEEE 802.16e Security
-
-
Pang, D.1
Tian, L.2
Hu, J.3
Zhou, J.4
Shi, J.5
-
6
-
-
67049154498
-
Security Vulnerabilities and Solutions in Mobile WiMAX
-
[6] Deininger, A., S. Kiyomoto, J. Kurihara, and T. Tanaka. Security Vulnerabilities and Solutions in Mobile WiMAX. LJCSNS International Journal of Computer Science and Network Security 2007; vol. 7; No. 11.
-
(2007)
LJCSNS International Journal of Computer Science and Network Security
, vol.7
, Issue.11
-
-
Deininger, A.1
Kiyomoto, S.2
Kurihara, J.3
Tanaka, T.4
-
7
-
-
33845261825
-
GKDA: A Group-Based Key Distribution Algorithm for WiMAX MBS Security
-
Li, H., and G. Fan. GKDA: A Group-Based Key Distribution Algorithm for WiMAX MBS Security, Advances in Multimedia Information Processing - PCM 2006; 4261: 310-318.
-
(2006)
Advances In Multimedia Information Processing - PCM
, vol.4261
, pp. 310-318
-
-
Li, H.1
Fan, G.2
-
8
-
-
38049024684
-
-
First International Conference, NBiS 2007, LNCS
-
Shon, T., and W. Choi. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. First International Conference, NBiS 2007, LNCS; 4650: 88-97.
-
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
, vol.4650
, pp. 88-97
-
-
Shon, T.1
Choi, W.2
-
12
-
-
67650679649
-
-
IEEE International Conference on Mobile Ad-hoc and Sensor Systems
-
Han, T., N. Zhang, K. Liu, B. Tang, and Y. Liu. Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. IEEE International Conference on Mobile Ad-hoc and Sensor Systems 2008: 828-833.
-
(2008)
Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
, pp. 828-833
-
-
Han, T.1
Zhang, N.2
Liu, K.3
Tang, B.4
Liu, Y.5
-
16
-
-
70350128180
-
On Computing Reliability and Expected Hop Count of Wireless Communication Networks
-
Soh, S., W. Lau, S. Rai and R. R. Brooks. On Computing Reliability and Expected Hop Count of Wireless Communication Networks. International Journal of Performability Engineering 2007; 3(2): 267-279.
-
(2007)
International Journal of Performability Engineering
, vol.3
, Issue.2
, pp. 267-279
-
-
Soh, S.1
Lau, W.2
Rai, S.3
Brooks, R.R.4
-
17
-
-
74849087358
-
Quantifying Application Communication Reliability of Wireless Sensor Networks
-
Shrestha, A., and L. Xing. Quantifying Application Communication Reliability of Wireless Sensor Networks. International Journal of Performability Engineering 2008; 4(1): 43-56.
-
(2008)
International Journal of Performability Engineering
, vol.4
, Issue.1
, pp. 43-56
-
-
Shrestha, A.1
Xing, L.2
-
19
-
-
85181053671
-
-
Available at, Last accessed 04/16/2010
-
Available at http://www.isi.edu/nsnam/ns/. Last accessed 04/16/2010.
-
-
-
-
20
-
-
85181111212
-
-
Available at, Last accessed 04/16/2010
-
Available at http://w3.antd.nist.gov/seamlessandsecure/pubtool.shtml#tools. Last accessed 04/16/2010.
-
-
-
-
21
-
-
0003664269
-
-
Second Edition, Irwin, Burr Ridge, Ill
-
Neter, J., W. Wasserman, and M. H. Kutner. Applied Linear Regression Models, Second Edition, Irwin, Burr Ridge, Ill. 1983.
-
(1983)
Applied Linear Regression Models
-
-
Neter, J.1
Wasserman, W.2
Kutner, M.H.3
-
22
-
-
0004161838
-
-
Second Edition, Cambridge University Press, Cambridge, UK
-
Press, W. H., W. T. Vetterling, S. A. Teukolsky, and B. P. Flannery. Numerical Recipes in FORTRAN. Second Edition, Cambridge University Press, Cambridge, UK, 1992.
-
(1992)
Numerical Recipes In FORTRAN
-
-
Press, W.H.1
Vetterling, W.T.2
Teukolsky, S.A.3
Flannery, B.P.4
|