-
2
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc '05), New York, 2005, pp. 46-57, ACM Press. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
3
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security, 2006, pp. 43-52. (Pubitemid 46634301)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
5
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis and defenses," in Proc. Int. Symp. Information Processing in Sensor Networks (IPSN), Apr. 2004, pp. 259-268.
-
(2004)
Proc. Int. Symp. Information Processing in Sensor Networks (IPSN)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
6
-
-
29144503110
-
Attack-resistant cooperation stimulation in autonomous Ad Hoc networks
-
DOI 10.1109/JSAC.2005.857201
-
W. Yu and K. J. R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, no. 12, pp. 2260-2271, Dec. 2005. (Pubitemid 41811977)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.12
, pp. 2260-2271
-
-
Yu, W.1
Ray Liu, K.J.2
-
7
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
4th Quarter
-
D. Djenouri, L. Khelladi, and A. N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Commun. Surveys Tutorials, vol. 7, no. 4, pp. 2-28, 4th Quarter, 2005.
-
(2005)
IEEE Commun. Surveys Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
8
-
-
33144465932
-
Information theoretic framework of trust modelling and evaluation for ad hoc networks
-
Feb
-
Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modelling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 305-317, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
9
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Feb
-
Y. L. Sun, Z. Han, and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Commun. Mag., vol. 46, no. 2, pp. 112-119, Feb. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.2
, pp. 112-119
-
-
Sun, Y.L.1
Han, Z.2
Liu, K.J.R.3
-
10
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Barcelona, Spain
-
Y. Sun, Z. Han, W. Yu, and K. J. R. Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM, Barcelona, Spain, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Sun, Y.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
11
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
DOI 10.1109/TMC.2007.1026
-
W. Yu and K. J. R. Liu, "Game theoretic analysis of cooperation stimulation and security in antonomous mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 459-473, May 2007. (Pubitemid 46495729)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.5
, pp. 459-473
-
-
Yu, W.1
Liu, K.J.R.2
-
12
-
-
77952581914
-
Maintaining defender's reputation in anomaly detection against insider attacks
-
Jun
-
N. Zhang,W.Yu, X. Fu, and S.K.Das, "Maintaining defender's reputation in anomaly detection against insider attacks," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 40, no. 3, pp. 597-611, Jun. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.40
, Issue.3
, pp. 597-611
-
-
Zhang, N.1
Yu, W.2
Fu, X.3
Das, S.K.4
-
13
-
-
79954567155
-
A cooperation stimulation strategy in wireless multicast networks
-
May
-
B. Niu, H. V. Zhao, and H. Jiang, "A cooperation stimulation strategy in wireless multicast networks," IEEE Trans. Signal Process., vol. 59, no. 5, pp. 2355-2369, May 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.5
, pp. 2355-2369
-
-
Niu, B.1
Zhao, H.V.2
Jiang, H.3
-
14
-
-
79951658780
-
Trust management and adversary detection for delay tolerant networks
-
San Jose, CA
-
E. Ayday, H. Lee, and F. Fekri, "Trust management and adversary detection for delay tolerant networks," in Proc. IEEE Military Commun. Conf., San Jose, CA, 2010.
-
(2010)
Proc. IEEE Military Commun. Conf.
-
-
Ayday, E.1
Lee, H.2
Fekri, F.3
-
15
-
-
27644522801
-
Evolution of indirect reciprocity
-
DOI 10.1038/nature04131, PII N04131
-
M. Nowak and K. Sigmund, "Evolution of indirect reciprocity," Nature, vol. 437, pp. 1291-1298, Oct. 2005. (Pubitemid 41568670)
-
(2005)
Nature
, vol.437
, Issue.7063
, pp. 1291-1298
-
-
Nowak, M.A.1
Sigmund, K.2
-
16
-
-
84871947315
-
Indirect reciprocity gamemodelling for securewireless networks
-
Ottawa, Canada, Jun
-
L. Xiao, W. S. Lin, Y. Chen, and K. J. R. Liu, "Indirect reciprocity gamemodelling for securewireless networks," inProc. Int. Conf. Communications (ICC), Ottawa, Canada, Jun. 2012.
-
(2012)
InProc. Int. Conf. Communications (ICC)
-
-
Xiao, L.1
Lin, W.S.2
Chen, Y.3
Liu, K.J.R.4
-
17
-
-
79551688226
-
Indirect reciprocity game modelling for cooperation stimulation in cognitive networks
-
Jan
-
Y. Chen and K. J. R. Liu, "Indirect reciprocity game modelling for cooperation stimulation in cognitive networks," IEEE Trans. Commun., vol. 59, no. 1, pp. 159-168, Jan. 2011.
-
(2011)
IEEE Trans. Commun.
, vol.59
, Issue.1
, pp. 159-168
-
-
Chen, Y.1
Liu, K.J.R.2
-
18
-
-
70349673250
-
A sybilproof indirect reciprociy mechansim for peer-to-peer networks
-
R. Landa, D. Griffin, R. Clegg, E. Mykoniati, and M. Rio, "A sybilproof indirect reciprociy mechansim for peer-to-peer networks," in Proc. IEEE INFOCOM, 2009, pp. 343-351.
-
(2009)
Proc. IEEE INFOCOM
, pp. 343-351
-
-
Landa, R.1
Griffin, D.2
Clegg, R.3
Mykoniati, E.4
Rio, M.5
-
19
-
-
80054075293
-
Exploiting jamming-caused neighbor changes for jammer localization
-
Mar
-
W. X. Z. Liu, H. Liu, and Y. Chen, "Exploiting jamming-caused neighbor changes for jammer localization," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 3, pp. 547-555, Mar. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.3
, pp. 547-555
-
-
Liu, W.X.Z.1
Liu, H.2
Chen, Y.3
-
21
-
-
0001432658
-
Discounted dynamic programming
-
D. Blackwell, "Discounted dynamic programming," Ann. Math. Statist., vol. 36, pp. 226-235, 1965.
-
(1965)
Ann. Math. Statist.
, vol.36
, pp. 226-235
-
-
Blackwell, D.1
|