-
1
-
-
84976699318
-
The byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Peasee, "The byzantine generals problem," ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.4
, Issue.3
-
-
Lamport, L.1
Shostak, R.2
Peasee, M.3
-
2
-
-
84878740941
-
A Delay-Bounded Event-Monitoring and Adversary-Identification Protocol in Resource-Constraint Sensor Networks
-
August
-
J. Koo, D.-H. Shin, X. Lin, and S. Bagchi, "A Delay-Bounded Event-Monitoring and Adversary-Identification Protocol in Resource-Constraint Sensor Networks," Elsevier Ad Hoc Networks, vol. 11, no. 6, pp. 1820-1835, August 2013.
-
(2013)
Elsevier Ad Hoc Networks
, vol.11
, Issue.6
, pp. 1820-1835
-
-
Koo, J.1
Shin, D.-H.2
Lin, X.3
Bagchi, S.4
-
3
-
-
39149117709
-
ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks
-
January
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks," ACM Transactions on Information and System Security (TISSEC), vol. 10, no. 4, pp. 1-35, January 2008.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.4
, pp. 1-35
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
4
-
-
70350757800
-
Packet-dropping Adversary Identification for Data Plane Security
-
X. Zhang, A. Jain, and A. Perrig, "Packet-dropping Adversary Identification for Data Plane Security," in ACM CoNEXT, 2008.
-
(2008)
ACM CoNEXT
-
-
Zhang, X.1
Jain, A.2
Perrig, A.3
-
5
-
-
84893581477
-
-
Technical Report, Available at
-
D.-H. Shin, J. Koo, L. Yang, X. Lin, S. Bagchi, and J. Zhang, "Low-Complexity Secure Protocols to Defend Cyber-Physical Systems Against Network Isolation Attacks," Technical Report, 2013. Available at http://www.public.asu.edu/~dshin17/pub/CNS13 TR.pdf.
-
(2013)
Low-Complexity Secure Protocols to Defend Cyber-Physical Systems Against Network Isolation Attacks
-
-
Shin, D.-H.1
Koo, J.2
Yang, L.3
Lin, X.4
Bagchi, S.5
Zhang, J.6
-
6
-
-
0013138682
-
Secure Routing for Mobile Ad Hoc Networks
-
P. Papadimitratos and Z. Haas, "Secure Routing for Mobile Ad Hoc Networks," in SCS CNDS, 2002.
-
(2002)
SCS CNDS
-
-
Papadimitratos, P.1
Haas, Z.2
-
7
-
-
1842643244
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y.-C. Hu, D. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," in IEEE WMCSA, 2002.
-
(2002)
IEEE WMCSA
-
-
Hu, Y.-C.1
Johnson, D.2
Perrig, A.3
-
8
-
-
17444426121
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
January
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, no. 1-2, pp. 21-38, January 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0035360861
-
Trajectory Sampling for Direct Traffic Observation
-
June
-
N. G. Duffield and M. Grossglauser, "Trajectory Sampling for Direct Traffic Observation," IEEE/ACM Transactions on Networking (TON), vol. 9, no. 3, pp. 280-292, June 2001.
-
(2001)
IEEE/ACM Transactions on Networking (TON)
, vol.9
, Issue.3
, pp. 280-292
-
-
Duffield, N.G.1
Grossglauser, M.2
-
10
-
-
33746654472
-
Improving Accuracy in End-to-End Packet Loss Measurement
-
J. Sommers, P. Barford, N. Duffield, and A. Ron, "Improving Accuracy in End-to-End Packet Loss Measurement," in ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Sommers, J.1
Barford, P.2
Duffield, N.3
Ron, A.4
-
11
-
-
36949000435
-
Accurate and Efficient SLA Compliance Monitoring
-
J. Sommers and N. Duffield, "Accurate and Efficient SLA Compliance Monitoring," in ACM SIGCOMM, 2007.
-
(2007)
ACM SIGCOMM
-
-
Sommers, J.1
Duffield, N.2
-
12
-
-
57349083089
-
Path-Quality Monitoring in the Presence of Adversaries
-
S. Goldberg, D. Xiao, E. Tromer, B. Barak, and J. Rexford, "Path-Quality Monitoring in the Presence of Adversaries," in ACM SIGMETRICS, 2008.
-
(2008)
ACM SIGMETRICS
-
-
Goldberg, S.1
Xiao, D.2
Tromer, E.3
Barak, B.4
Rexford, J.5
-
13
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in ACM MobiCom, 2000.
-
(2000)
ACM MobiCom
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
14
-
-
84866451765
-
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
-
I. Khalil, S. Bagchi, and N. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," in IEEE/IFIP DSN, 2005.
-
(2005)
IEEE/IFIP DSN
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.3
-
15
-
-
84893604386
-
Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks
-
D.-H. Shin and S. Bagchi, "Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks," in ACM MobiHoc, 2009.
-
(2009)
ACM MobiHoc
-
-
Shin, D.-H.1
Bagchi, S.2
-
16
-
-
84861590030
-
Distributed Online Channel Assignment Toward Optimal Monitoring in Multi-Channel Wireless Networks
-
D.-H. Shin, S. Bagchi, and C.-C. Wang, "Distributed Online Channel Assignment Toward Optimal Monitoring in Multi-Channel Wireless Networks," in IEEE INFOCOM, Mini-conference, 2012.
-
IEEE INFOCOM, Mini-conference, 2012
-
-
Shin, D.-H.1
Bagchi, S.2
Wang, C.-C.3
-
17
-
-
84875736019
-
An Optimization Framework for Monitoring Multi-Channel Multi-Radio Wireless Mesh Networks
-
May
-
D.-H. Shin and S. Bagchi, "An Optimization Framework for Monitoring Multi-Channel Multi-Radio Wireless Mesh Networks," Elsevier Ad Hoc Networks, vol. 11, no. 3, pp. 926-943, May 2013.
-
(2013)
Elsevier Ad Hoc Networks
, vol.11
, Issue.3
, pp. 926-943
-
-
Shin, D.-H.1
Bagchi, S.2
-
18
-
-
84893619339
-
Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks
-
D.-H. Shin, S. Bagchi, and C.-C. Wang, "Toward Optimal Sniffer-Channel Assignment for Reliable Monitoring in Multi-Channel Wireless Networks," in IEEE SECON, 2013.
-
(2013)
IEEE SECON
-
-
Shin, D.-H.1
Bagchi, S.2
Wang, C.-C.3
|