-
1
-
-
29144503110
-
Attack-resistant cooperation stimulation in autonomous ad hoc networks
-
Dec.
-
W. Yu and K.J.R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks," IEEE J. Sel. Areas Commun., vol. 23, pp. 2260-2271, Dec. 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, pp. 2260-2271
-
-
Yu, W.1
Liu, K.J.R.2
-
2
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in antonomous mobile ad hoc networks
-
May
-
W. Yu and K.J.R. Liu, "Game theoretic analysis of cooperation stimulation and security in antonomous mobile ad hoc networks," IEEE Trans. Mobile Comput., pp. 459-473, May 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, pp. 459-473
-
-
Yu, W.1
Liu, K.J.R.2
-
3
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
D. Djenouri, L. Khelladi, and A.N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys and Tutorials, vol. 7, pp. 2 - 28, 2005.
-
(2005)
IEEE Communications Surveys and Tutorials
, vol.7
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
4
-
-
33144465932
-
Information theoretic framework of trust modelling and evaluation for ad hoc networks
-
Feb.
-
Y. Sun,W. Yu, Z. Han, and K.J.R. Liu, "Information theoretic framework of trust modelling and evaluation for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, pp. 305-317, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, pp. 305-317
-
-
Sunw. Yu, Y.1
Han, Z.2
Liu, K.J.R.3
-
5
-
-
77952581914
-
Maintaining defender's reputation in anomaly detection against insider attacks
-
June
-
N. Zhang, W. Yu, X. Fu, and S.K. Das, "Maintaining defender's reputation in anomaly detection against insider attacks," IEEE Trans. Systems, Man, and Cybernetics, vol. 40, pp. 597 - 611, June 2010.
-
(2010)
IEEE Trans. Systems, Man, and Cybernetics
, vol.40
, pp. 597-611
-
-
Zhang, N.1
Yu, W.2
Fu, X.3
Das, S.K.4
-
6
-
-
79954567155
-
A cooperation stimulation strategy in wireless multicast networks
-
May
-
B. Niu, H.V. Zhao, and H. Jiang, "A cooperation stimulation strategy in wireless multicast networks," IEEE Trans. Signal Processing, vol. 59, pp. 2355 - 2369, May 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, pp. 2355-2369
-
-
Niu, B.1
Zhao, H.V.2
Jiang, H.3
-
7
-
-
79951658780
-
Trust management and adversary detection for delay tolerant networks
-
E. Ayday, H. Lee, and F. Fekri, "Trust management and adversary detection for delay tolerant networks," in Proc. IEEE Military Comm. Conf., 2010.
-
(2010)
Proc. IEEE Military Comm. Conf.
-
-
Ayday, E.1
Lee, H.2
Fekri, F.3
-
8
-
-
27644522801
-
Evolution of indirect reciprocity
-
Oct.
-
M. Nowak and K. Sigmund, "Evolution of indirect reciprocity," Nature, vol. 437, pp. 1291-1298, Oct. 2005.
-
(2005)
Nature
, vol.437
, pp. 1291-1298
-
-
Nowak, M.1
Sigmund, K.2
-
9
-
-
79551688226
-
Indirect reciprocity game modelling for cooperation stimulation in cognitive networks
-
Jan.
-
Y. Chen and K.J.R. Liu, "Indirect reciprocity game modelling for cooperation stimulation in cognitive networks," IEEE Trans. Comm., vol. 59, pp. 159-168, Jan. 2011.
-
(2011)
IEEE Trans. Comm.
, vol.59
, pp. 159-168
-
-
Chen, Y.1
Liu, K.J.R.2
-
10
-
-
70349673250
-
A sybilproof indirect reciprociy mechansim for peer-to-peer networks
-
R. Landa, D. Griffin, R. Clegg, E. Mykoniati, and M. Rio, "A sybilproof indirect reciprociy mechansim for peer-to-peer networks," in Proc. IEEE INFOCOM, 2009, pp. 343-351.
-
(2009)
Proc. IEEE INFOCOM
, pp. 343-351
-
-
Landa, R.1
Griffin, D.2
Clegg, R.3
Mykoniati, E.4
Rio, M.5
|