-
1
-
-
0003209840
-
Integrated services in the internet architecture: An overview
-
Jun.
-
R. Braden, D. Clark, and S. Shenker, "Integrated Services in the Internet Architecture: An Overview," IETF, RFC 1633, Jun. 1994.
-
(1994)
IETF, RFC 1633
-
-
Braden, R.1
Clark, D.2
Shenker, S.3
-
2
-
-
0002346271
-
An architecture for differentiated services
-
Dec.
-
S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, "An Architecture for Differentiated Services," IETF, RFC 2475, Dec. 1998.
-
(1998)
IETF, RFC 2475
-
-
Blake, S.1
Black, D.2
Carlson, M.3
Davies, E.4
Wang, Z.5
Weiss, W.6
-
3
-
-
84880274363
-
Multilevel security and quality of protection
-
Como, Italy, Sep.
-
S. N. Foley, S. Bistarelli, B. O'Sullivan, J. Herbert, and G. Swart, "Multilevel Security and Quality of Protection," in First Workshop on Quality of Protection, Como, Italy, Sep. 2005.
-
(2005)
First Workshop on Quality of Protection
-
-
Foley, S.N.1
Bistarelli, S.2
O'sullivan, B.3
Herbert, J.4
Swart, G.5
-
4
-
-
34250342230
-
An integrated solution to delay and security support in wireless networks
-
Las Vegas, NV, USA, Apr.
-
W. He and K. Nahrstedt, in "An Integrated Solution to Delay and Security Support in Wireless Networks," in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, NV, USA, Apr. 2006.
-
(2006)
Proc. IEEE Wireless Communications and Networking Conference (WCNC)
-
-
He, W.1
Nahrstedt, K.2
-
5
-
-
70450277340
-
Exploring the security requirements for quality of service in combined wired and wireless networks
-
Leipzig, Germany, Jun.
-
Z. Fadlullah, T. Taleb, N. Nasser, and N. Kato, "Exploring the security requirements for quality of service in combined wired and wireless networks," in Proc. IWCMC'09, Leipzig, Germany, Jun. 2009.
-
(2009)
Proc. IWCMC'09
-
-
Fadlullah, Z.1
Taleb, T.2
Nasser, N.3
Kato, N.4
-
6
-
-
44549084937
-
Game theoretic models for detecting network intrusions
-
Jun.
-
H. Otrok, M. Mehrandish, C. Assi, M. Debbabi, and P. Bhattacharya, "Game theoretic models for detecting network intrusions," Computer Communications, vol. 31, no. 10, Jun. 2008, pp. 1934-1944.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 1934-1944
-
-
Otrok, H.1
Mehrandish, M.2
Assi, C.3
Debbabi, M.4
Bhattacharya, P.5
-
7
-
-
39149117050
-
A game-theoretic intrusion detection model for mobile ad hoc networks
-
Mar.
-
H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya, "A game-theoretic intrusion detection model for mobile ad hoc networks," Computer Communications, vol. 31, no. 4, Mar. 2008, pp. 708-721.
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 708-721
-
-
Otrok, H.1
Mohammed, N.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
9
-
-
70349236493
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
Pisa, Italy, Oct.
-
Y. Liu, C. Comaniciu, and H. Man, "A bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. ACM GameNets'06, Pisa, Italy, Oct. 2006.
-
(2006)
Proc. ACM GameNets'06
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
10
-
-
50649099699
-
A game theoretic framework of distributed power and rate control in ieee 802.11 wlans
-
Sep.
-
L. Chen and J. Leneutre, "A game theoretic framework of distributed power and rate control in ieee 802.11 wlans," IEEE Journal on Selected Areas in Communications, vo. 26, no. 7, Sep. 2008, pp. 1128-1137.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.7
, pp. 1128-1137
-
-
Chen, L.1
Leneutre, J.2
-
11
-
-
34848845258
-
Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks
-
Pisa, Italy, Oct.
-
L. Chen and J. Leneutre, "Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks," in Proc. ICDCS'07, Pisa, Italy, Oct. 2007.
-
(2007)
Proc. ICDCS'07
-
-
Chen, L.1
Leneutre, J.2
-
12
-
-
77955771346
-
Dtrab: Combating against attacks on encrypted protocols through traffic-feature analysis
-
Aug.
-
Z. M. Fadlullah, T. Taleb, A. Vasilakos, M. Guizani, and N. Kato, "Dtrab: Combating against attacks on encrypted protocols through traffic-feature analysis," IEEE/ACM Transactions on Networking, vol. 18, no. 4, Aug. 2010, pp. 1234-1247.
-
(2010)
IEEE/ACM Transactions on Networking
, vol.18
, Issue.4
, pp. 1234-1247
-
-
Fadlullah, Z.M.1
Taleb, T.2
Vasilakos, A.3
Guizani, M.4
Kato, N.5
-
15
-
-
84875379930
-
-
MATLAB, available at: www.mathworks.com
-
MATLAB
-
-
|