-
1
-
-
84867386224
-
Future mobile communication networks: Challenges in the design and operation
-
10.1109/MVT.2011.2179343 10.1109/MVT.2011.2179343
-
Marsch P, Raaf B, Szufarska A, Mogensen P, Hao G, Farber M et al (2012) Future mobile communication networks: challenges in the design and operation. Vehicul Technol Mag, IEEE 7(1):16-23. doi: 10.1109/MVT.2011.2179343
-
(2012)
Vehicul Technol Mag, IEEE
, vol.7
, Issue.1
, pp. 16-23
-
-
Marsch, P.1
Raaf, B.2
Szufarska, A.3
Mogensen, P.4
Hao, G.5
Farber, M.6
-
2
-
-
13844296355
-
Wireless mesh networks: A survey
-
10.1016/j.comnet.2004.12.001 1152.68319
-
Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw ISDN Syst 47(4):445-487. doi: 10.1016/j.comnet.2004.12.001
-
(2005)
Comput Netw ISDN Syst
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
3
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
12-15 Nov doi: 10.1109/ICNP.2002.1181388
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, 12-15 Nov. 2002 (pp. 78-87). doi: 10.1109/ICNP.2002.1181388
-
(2002)
Network Protocols, 2002. Proceedings. 10th IEEE International Conference on
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
4
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
10.1007/s11276-004-4744-y 10.1007/s11276-004-4744-y
-
Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1-2):21-38. doi: 10.1007/s11276-004-4744-y
-
(2005)
Wirel Netw
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
10.1145/581291.581312 10.1145/581291.581312
-
Zapata MG (2002) Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob Comput Commun Rev 6(3):106-107. doi: 10.1145/581291.581312
-
(2002)
SIGMOBILE Mob Comput Commun Rev
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
-
6
-
-
84875695373
-
A key management and secure routing integrated framework for mobile Ad-hoc networks
-
10.1016/j.adhoc.2012.11.005 10.1016/j.adhoc.2012.11.005
-
Zhao S, Kent R, Aggarwal A (2013) A key management and secure routing integrated framework for mobile Ad-hoc networks. Ad Hoc Netw 11(3):1046-1061. doi: 10.1016/j.adhoc.2012.11.005
-
(2013)
Ad Hoc Netw
, vol.11
, Issue.3
, pp. 1046-1061
-
-
Zhao, S.1
Kent, R.2
Aggarwal, A.3
-
7
-
-
70049105507
-
SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks
-
10.1002/sec.60 10.1002/sec.60
-
Li Q, Zhao M, Walker J, Hu Y-C, Perrig A, Trappe W (2009) SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Sec Commun Netw 2(4):325-340. doi: 10.1002/sec.60
-
(2009)
Sec Commun Netw
, vol.2
, Issue.4
, pp. 325-340
-
-
Li, Q.1
Zhao, M.2
Walker, J.3
Hu, Y.-C.4
Perrig, A.5
Trappe, W.6
-
8
-
-
77954089319
-
A cluster-based trust-aware routing protocol for mobile ad hoc networks
-
10.1007/s11276-009-0182-1 10.1007/s11276-009-0182-1
-
Safa H, Artail H, Tabet D (2010) A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel Netw 16(4):969-984. doi: 10.1007/s11276-009-0182-1
-
(2010)
Wirel Netw
, vol.16
, Issue.4
, pp. 969-984
-
-
Safa, H.1
Artail, H.2
Tabet, D.3
-
9
-
-
55549128918
-
Intrusion detection using a linguistic hedged fuzzy-XCS classifier system
-
10.1007/s00500-008-0322-z 10.1007/s00500-008-0322-z
-
Marín-Blázquez JG, Pérez GM (2008) Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. Soft Comput 13(3):273-290. doi: 10.1007/s00500-008-0322-z
-
(2008)
Soft Comput
, vol.13
, Issue.3
, pp. 273-290
-
-
Marín-Blázquez, J.G.1
Pérez, G.M.2
-
10
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
10.1007/s11036-008-0113-x 10.1007/s11036-008-0113-x
-
Schmidt A-D, Peters F, Lamour F, Scheel C, Çamtepe SA, Albayrak S (2009) Monitoring smartphones for anomaly detection. Mob Netw Appl 14(1):92-106. doi: 10.1007/s11036-008-0113-x
-
(2009)
Mob Netw Appl
, vol.14
, Issue.1
, pp. 92-106
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Çamtepe, S.A.5
Albayrak, S.6
-
11
-
-
84255195597
-
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
-
10.1002/sec.341 10.1002/sec.341
-
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N, Gritzalis S (2012) Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Sec Commun Netw 5(1):3-14. doi: 10.1002/sec.341
-
(2012)
Sec Commun Netw
, vol.5
, Issue.1
, pp. 3-14
-
-
Damopoulos, D.1
Menesidou, S.A.2
Kambourakis, G.3
Papadaki, M.4
Clarke, N.5
Gritzalis, S.6
-
12
-
-
34548323745
-
Attack analysis and detection for Ad Hoc routing protocols
-
E. Jonsson A. Valdes M. Almgren (eds) Lecture notes in computer science 3224 Springer Berlin Heidelberg 10.1007/978-3-540-30143-1-7
-
Huang Y-A, Lee W (2004) Attack analysis and detection for Ad Hoc routing protocols. In: Jonsson E, Valdes A, Almgren M (eds) Recent advances in intrusion detection, vol 3224, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 125-145
-
(2004)
Recent Advances in Intrusion Detection
, pp. 125-145
-
-
Huang, Y.-A.1
Lee, W.2
-
13
-
-
33646178576
-
An EFSM-based intrusion detection system for ad hoc networks
-
D. Peled Y-K Tsay (eds) Lecture notes in computer science 3707 Springer Berlin Heidelberg 10.1007/11562948-30
-
Orset J-M, Alcalde B, Cavalli A (2005) An EFSM-based intrusion detection system for ad hoc networks. In: Peled D, Tsay Y-K (eds) Automated technology for verification and analysis, vol 3707, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 400-413
-
(2005)
Automated Technology for Verification and Analysis
, pp. 400-413
-
-
Orset, J.-M.1
Alcalde, B.2
Cavalli, A.3
-
14
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
Fairfax, Virginia
-
Tseng C-Y, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. Paper presented at the Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, Virginia
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
15
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
10.1016/s1389-1286(99)00112-7 10.1016/S1389-1286(99)00112-7
-
Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23-24):2435-2463. doi: 10.1016/s1389-1286(99)00112-7
-
(1999)
Comput Netw
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
17
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
10.1023/a:1024600519144 10.1023/A:1024600519144
-
Zhang Y, Lee W, Huang Y-A (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545-556. doi: 10.1023/a:1024600519144
-
(2003)
Wirel Netw
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
18
-
-
84892356426
-
Security issues in wireless mesh networks
-
E. Hossain K. Leung (eds) Springer US 10.1007/978-0-387-68839-8-12
-
Zhang W, Wang Z, Das SK, Hassan M (2007) Security issues in wireless mesh networks. In: Hossain E, Leung K (eds) Wireless mesh networks. Springer, US, pp 309-330
-
(2007)
Wireless Mesh Networks
, pp. 309-330
-
-
Zhang, W.1
Wang, Z.2
Das, S.K.3
Hassan, M.4
-
20
-
-
84894779113
-
-
B.A.T.M.A.N. Advanced Accessed December 2012
-
B.A.T.M.A.N. Advanced. http://www.open-mesh.org. Accessed December 2012
-
-
-
-
22
-
-
84860001693
-
Towards benchmarking routing protocols in wireless mesh networks
-
10.1016/j.adhoc.2011.03.010 10.1016/j.adhoc.2011.03.010
-
Friginal J, de Andrés D, Ruiz J-C, Gil P (2011) Towards benchmarking routing protocols in wireless mesh networks. Ad Hoc Netw 9(8):1374-1388. doi: 10.1016/j.adhoc.2011.03.010
-
(2011)
Ad Hoc Netw
, vol.9
, Issue.8
, pp. 1374-1388
-
-
Friginal, J.1
De Andrés, D.2
Ruiz, J.-C.3
Gil, P.4
-
23
-
-
84871379559
-
An event-based packet dropping detection scheme for wireless mesh networks
-
Y. Xiang J. Lopez C.C.J. Kuo W. Zhou (eds) Lecture notes in computer science 7672 Springer Berlin Heidelberg 10.1007/978-3-642-35362-8-24
-
Morais A, Cavalli A (2012) An event-based packet dropping detection scheme for wireless mesh networks. In: Xiang Y, Lopez J, Kuo CCJ, Zhou W (eds) Cyberspace safety and security, vol 7672, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 309-323
-
(2012)
Cyberspace Safety and Security
, pp. 309-323
-
-
Morais, A.1
Cavalli, A.2
-
29
-
-
84871370165
-
-
Accessed December 2012
-
Virtual Distributed ethernet switch. http://wiki.virtualsquare.org/wiki/ index.php/VDE. Accessed December 2012
-
Virtual Distributed Ethernet Switch
-
-
-
32
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, Massachusetts, United States
-
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. Paper presented at the Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, Massachusetts, United States
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
33
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
10.1109/JSAC.2005.861384 10.1109/JSAC.2005.861384
-
Hao Y, Shu J, Xiaoqiao M, Songwu L (2006) SCAN: self-organized network-layer security in mobile ad hoc networks. Select Areas Commun, IEEE J 24(2):261-273. doi: 10.1109/JSAC.2005.861384
-
(2006)
Select Areas Commun, IEEE J
, vol.24
, Issue.2
, pp. 261-273
-
-
Hao, Y.1
Shu, J.2
Xiaoqiao, M.3
Songwu, L.4
-
34
-
-
53749101677
-
LIDF: Layered intrusion detection framework for ad-hoc networks
-
10.1016/j.adhoc.2008.01.001 10.1016/j.adhoc.2008.01.001
-
Komninos N, Douligeris C (2009) LIDF: layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw 7(1):171-182. doi: 10.1016/j.adhoc.2008.01.001
-
(2009)
Ad Hoc Netw
, vol.7
, Issue.1
, pp. 171-182
-
-
Komninos, N.1
Douligeris, C.2
-
35
-
-
79151476472
-
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
-
10.1016/j.comcom.2010.04.040 10.1016/j.comcom.2010.04.040
-
Saxena N, Denko M, Banerji D (2011) A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Comput Commun 34(4):548-555. doi: 10.1016/j.comcom.2010.04.040
-
(2011)
Comput Commun
, vol.34
, Issue.4
, pp. 548-555
-
-
Saxena, N.1
Denko, M.2
Banerji, D.3
|