-
1
-
-
84893213953
-
R-BGP: Staying connected in a connected world
-
N. Kushman, S. Kandula, D. Katabi, and B.M. Maggs, "R-BGP: Staying Connected in a Connected World," Proc. Fourth USENIX Conf. Networked Systems Design and Implementation, 2007.
-
(2007)
Proc. Fourth USENIX Conf. Networked Systems Design and Implementation
-
-
Kushman, N.1
Kandula, S.2
Katabi, D.3
Maggs, B.M.4
-
2
-
-
33845635202
-
Wormhole-based antijamming techniques in sensor networks
-
DOI 10.1109/TMC.2007.250674
-
M. Cagalj, S. Capkun, and J. Hubaux, "Wormhole-Based Anti- Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, June 2007. (Pubitemid 44955817)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.1
, pp. 100-114
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
3
-
-
37649026406
-
A centralized scheduling algorithm based on multi-path routing in wimax mesh network
-
Y. Cao, Z. Liu, and Y. Yang, "A Centralized Scheduling Algorithm Based on Multi-Path Routing in Wimax Mesh Network," Proc. Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM), 2006.
-
(2006)
Proc. Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM)
-
-
Cao, Y.1
Liu, Z.2
Yang, Y.3
-
5
-
-
51349125793
-
Dynamic jamming mitigation for wireless broadcast networks
-
J.T. Chiang and Y.-C. Hu, "Dynamic Jamming Mitigation for Wireless Broadcast Networks," Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Chiang, J.T.1
Hu, Y.-C.2
-
7
-
-
80054075293
-
Exploiting jamming- caused neighbor changes for jammer localization
-
Mar
-
Z. Liu, H. Liu, W. Xu, and Y. Chen, "Exploiting Jamming- Caused Neighbor Changes for Jammer Localization," IEEE Trans. Pattern and Distributed Systems, vol. 23, no. 3, pp. 547-555, Mar. 2012.
-
(2012)
IEEE Trans. Pattern and Distributed Systems
, vol.23
, Issue.3
, pp. 547-555
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
8
-
-
4444237581
-
Spread: Enhancing data confidentiality in mobile ad hoc networks
-
W. Lou, W. Liu, and Y. Fang, "Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Lou, W.1
Liu, W.2
Fang, Y.3
-
12
-
-
80051890357
-
Short paper: Jamming-resilient multipath routing leveraging availability- based correlation
-
H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, "Short Paper: Jamming-Resilient Multipath Routing Leveraging Availability- Based Correlation," Proc. Fourth ACM Conf. Wireless Network Security (WiSec), 2011.
-
(2011)
Proc. Fourth ACM Conf. Wireless Network Security (WiSec)
-
-
Mustafa, H.1
Zhang, X.2
Liu, Z.3
Xu, W.4
Perrig, A.5
-
14
-
-
84866615729
-
-
U. O. W. Network Security Lab. Jamming Framework, Univ. of Washington
-
U. O. W. Network Security Lab, "Jamming Framework for ns-3," Jamming Framework, Univ. of Washington, 2010.
-
(2010)
Jamming Framework for ns-3
-
-
-
15
-
-
29844445404
-
Low-power DoS attacks in data wireless lans and countermeasures
-
G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
-
(2003)
SIGMOBILE Mobile Computing and Comm. Rev.
, vol.7
, Issue.3
, pp. 29-30
-
-
Noubir, G.1
Lin, G.2
-
16
-
-
0031353437
-
A highly adaptive distributed routing algorithm for mobile wireless networks
-
V. Park and M. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. IEEE INFOCOM, 1997.
-
(1997)
Proc. IEEE INFOCOM
-
-
Park, V.1
Corson, M.2
-
17
-
-
84891657889
-
A new implementation of yen's ranking loopless paths algorithm
-
M. Pascoal and E. Martins, "A New Implementation of Yen's Ranking Loopless Paths Algorithm," 4OR: Quarterly J. Operations Research, vol. 1, pp. 121-133, 2003.
-
(2003)
4OR: Quarterly J. Operations Research
, vol.1
, pp. 121-133
-
-
Pascoal, M.1
Martins, E.2
-
19
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "The Tesla Broadcast Authentication Protocol," RSA Cryptobytes, 2002.
-
(2002)
RSA Cryptobytes
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
22
-
-
79951947094
-
Jamming- aware traffic allocation for multiple-path routing using portfolio selection
-
Feb
-
P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, "Jamming- Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection," IEEE Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
-
(2011)
IEEE Trans. Networking
, vol.19
, Issue.1
, pp. 184-194
-
-
Tague, P.1
Nabar, S.2
Ritcey, J.3
Poovendran, R.4
-
23
-
-
69949189311
-
Throughput optimization for multipath unicast routing under probabilistic jamming
-
P. Tague, S. Nabar, J. Ritcey, D. Slater, and R. Poovendran, "Throughput Optimization for Multipath Unicast Routing under Probabilistic Jamming," Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (IPIMRC), 2008.
-
(2008)
Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (IPIMRC)
-
-
Tague, P.1
Nabar, S.2
Ritcey, J.3
Slater, D.4
Poovendran, R.5
-
24
-
-
2342588224
-
Analysis of multipath routingpart I: The effect on the packet delivery ratio
-
Jan
-
A. Tsirigos and Z. Haas, "Analysis of Multipath Routingpart I: The Effect on the Packet Delivery Ratio," Proc. IEEE Trans. Wireless Comm., vol. 3, no. 1, pp. 136-146, Jan. 2004.
-
(2004)
Proc. Rfsti IEEE Trans. Wireless Comm.
, vol.3
, Issue.1
, pp. 136-146
-
-
Tsirigos, A.1
Haas, Z.2
-
25
-
-
0042976102
-
Cooperative packet caching and shortest multipath routing in mobile ad hoc networks
-
A. Valera, W.K.G. Seah, and S. Rao, "Cooperative Packet Caching and Shortest Multipath Routing in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Valera, A.1
Seah, W.K.G.2
Rao, S.3
-
26
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
-
A.D. Wood, J.A. Stankovic, and G. Zhou, "DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-Based Wireless Networks," Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), 2007.
-
(2007)
Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON)
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
30
-
-
56749150049
-
Anti-jamming timing channels for wireless networks
-
W. Xu, W. Trappe, and Y. Zhang, "Anti-Jamming Timing Channels for Wireless Networks," Proc. First ACM Conf. Wireless Network Security (WiSec), pp. 203-213, 2008.
-
(2008)
Proc. First ACM Conf. Wireless Network Security (WiSec)
, pp. 203-213
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
31
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. MobiHoc, 2005.
-
(2005)
Proc. MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
32
-
-
34748832212
-
Source selectable path diversity via routing deflections
-
X. Yang and D. Wetherall, "Source Selectable Path Diversity via Routing Deflections," Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Yang, X.1
Wetherall, D.2
-
34
-
-
0036285471
-
Load balancing of multipath source routing in ad hoc networks
-
L. Zhang, Z. Zhao, Y. Shu, L. Wang, and O. Yang, "Load Balancing of Multipath Source Routing in Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC), 2002.
-
(2002)
Proc. IEEE Int'l Conf. Comm. (ICC)
-
-
Zhang, L.1
Zhao, Z.2
Shu, Y.3
Wang, L.4
Yang, O.5
-
35
-
-
80051959854
-
SCION: Scalability control, and isolation on next- generation networks
-
X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D.G. Andersen, "SCION: Scalability Control, and Isolation on Next- Generation Networks," Proc. IEEE Symp. Security and Privacy, 2011.
-
(2011)
Proc. IEEE Symp. Security and Privacy
-
-
Zhang, X.1
Hsiao, H.-C.2
Hasker, G.3
Chan, H.4
Perrig, A.5
Andersen, D.G.6
-
36
-
-
79551639512
-
Correlation-resilient path selection for multi-path routing
-
X. Zhang and A. Perrig, "Correlation-Resilient Path Selection for Multi-Path Routing," Proc. IEEE Globecom, 2010.
-
(2010)
Proc. IEEE Globecom
-
-
Zhang, X.1
Perrig, A.2
|