-
1
-
-
72949120015
-
Device-to-device communication as an underlay to LTE-advanced networks
-
Doppler, K., Rinne, M., Wijting, C., Ribeiro, C.B., Hugl, K.: Device-to-device communication as an underlay to LTE-advanced networks. IEEE Communications Magazine 47(12), 42–49 (2009)
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 42-49
-
-
Doppler, K.1
Rinne, M.2
Wijting, C.3
Ribeiro, C.B.4
Hugl, K.5
-
2
-
-
84900414638
-
Device-to-device communications in cellular networks
-
Feng, D., Lu, L., Yuan-Wu, Y., Ye Li, G., Li, S., Feng, G.: Device-to-device communications in cellular networks. IEEE Communications Magazine 52(4), 49–55 (2014)
-
(2014)
IEEE Communications Magazine
, vol.52
, Issue.4
, pp. 49-55
-
-
Feng, D.1
Lu, L.2
Yuan-Wu, Y.3
Ye Li, G.4
Li, S.5
Feng, G.6
-
3
-
-
84858121087
-
Design aspects of network assisted device-to-device communications
-
Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Miklos, G., Turanyi, Z.: Design aspects of network assisted device-to-device communications. IEEE Communications Magazine 50(3), 170–177 (2012)
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.3
, pp. 170-177
-
-
Fodor, G.1
Dahlman, E.2
Mildh, G.3
Parkvall, S.4
Reider, N.5
Miklos, G.6
Turanyi, Z.7
-
4
-
-
84900422594
-
Relay-by-Smartphone: Realizing Multihop Device-to-Device Communications
-
Nishiyama, H., Ito, M., Kato, N.: Relay-by-Smartphone: Realizing Multihop Device-to-Device Communications. IEEE Communications Magazine 52(4), 56–65 (2014)
-
(2014)
IEEE Communications Magazine
, vol.52
, Issue.4
, pp. 56-65
-
-
Nishiyama, H.1
Ito, M.2
Kato, N.3
-
5
-
-
84890430700
-
Secrecy-Based Access Control for Deviceto- Device Communication Underlaying Cellular Networks
-
Jianting, Y., Chuan, M., Hui, Y. Wei, Z.: Secrecy-Based Access Control for Deviceto- Device Communication Underlaying Cellular Networks. IEEE Communications Magazine 17(11), 2068–2071 (2013)
-
(2013)
IEEE Communications Magazine
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Jianting, Y.1
Chuan, M.2
Hui Wei, Y.Z.3
-
6
-
-
84905227083
-
Deviceto- device communications: The physical layer security advantage
-
Daohua, Z., Swindlehurst, A.L., Fakoorian, S. A. A., Wei, X. Chunming, Z.: Deviceto- device communications: The physical layer security advantage. IEEE Communications Magazine, 1606–1610 (2014)
-
(2014)
IEEE Communications Magazine
, pp. 1606-1610
-
-
Daohua, Z.1
Swindlehurst, A.L.2
Fakoorian, S.A.A.3
Wei, X.4
Chunming, Z.5
-
7
-
-
84910004252
-
-
accessed June
-
F-Secure: Bluetooth-Worm:SymbOS/Cabir, http://www.f-secure.com/v-descs/cabir.shtml (accessed June 2004)
-
(2004)
-
-
-
8
-
-
36049030713
-
Quantifying the effectiveness of mobile phone virus response mechanisms
-
Van Ruitenbeek, E., Courtney, T., Sanders, W.H., Stevens, F.: Quantifying the effectiveness of mobile phone virus response mechanisms. In: Proc. of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 790–800 (2007)
-
(2007)
Proc. of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
, pp. 790-800
-
-
Van Ruitenbeek, E.1
Courtney, T.2
Sanders, W.H.3
Stevens, F.4
-
9
-
-
50049087364
-
On mobile viruses exploiting messaging and bluetooth services
-
Bose, A., Shin, K.G.: On mobile viruses exploiting messaging and bluetooth services. In: Proc. of the Securecomm and Workshops, pp. 1–10 (2006)
-
(2006)
Proc. of the Securecomm and Workshops
, pp. 1-10
-
-
Bose, A.1
Shin, K.G.2
-
10
-
-
84873712223
-
A survey on security for mobile devices
-
La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Communications Surveys and Tutorials 15(1), 446–471 (2013)
-
(2013)
IEEE Communications Surveys and Tutorials
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
11
-
-
33751084887
-
Host-based intrusion detection for advanced mobile devices
-
Miettinen, M., Halonen, P., Hatonen, K.: Host-based intrusion detection for advanced mobile devices. In: Proc. of the 20th International Conference on Advanced Information Networking and Applications (AINA), vol. 2, pp. 72–76 (2006)
-
(2006)
Proc. of the 20th International Conference on Advanced Information Networking and Applications (AINA)
, vol.2
, pp. 72-76
-
-
Miettinen, M.1
Halonen, P.2
Hatonen, K.3
-
12
-
-
84907207994
-
An anonymous end-to-end communication protocol for mobile cloud environments
-
Ardagna, C.A., Conti, M., Leone, M., Stefa, J.: An anonymous end-to-end communication protocol for mobile cloud environments. IEEE Transactions on Services Computing (2014)
-
(2014)
IEEE Transactions on Services Computing
-
-
Ardagna, C.A.1
Conti, M.2
Leone, M.3
Stefa, J.4
-
13
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
Felegyhazi, M., Buttyan, L., Hubaux, J.-P.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Comput. 5(5), 463–476 (2006)
-
(2006)
IEEE Transactions on Mobile Comput
, vol.5
, Issue.5
, pp. 463-476
-
-
Felegyhazi, M.1
Buttyan, L.2
Hubaux, J.-P.3
-
15
-
-
77949264858
-
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
-
Cho, J.H., Chen, I.R., Feng, P.G.: Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks. IEEE Transactions on Reliability 59(1), 231–241 (2010)
-
(2010)
IEEE Transactions on Reliability
, vol.59
, Issue.1
, pp. 231-241
-
-
Cho, J.H.1
Chen, I.R.2
Feng, P.G.3
-
16
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 119–139 (1997)
-
(1997)
Journal of Computer and System Sciences
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
18
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
-
Liu, Y., Comaniciou, C., Man, H.: Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection. International Journal of Security and Networks 1(7), 243–254 (2006)
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.7
, pp. 243-254
-
-
Liu, Y.1
Comaniciou, C.2
Man, H.3
-
21
-
-
35948980415
-
A cooperative approach for analyzing intrusions in mobile ad hoc networks
-
ICDCSW
-
Otrok, H., Debbabi, M., Assi, C., Bhattacharya, P.: A cooperative approach for analyzing intrusions in mobile ad hoc networks. In: Proc. of the International Conference on Distributed Computing Systems Workshops, ICDCSW (2007)
-
(2007)
Proc. of the International Conference on Distributed Computing Systems Workshops
-
-
Otrok, H.1
Debbabi, M.2
Assi, C.3
Bhattacharya, P.4
-
22
-
-
77951287085
-
A game theoretic approach for securing AODV in emergency mobile ad hoc networks
-
Zurich, Switzerland
-
Panaousis, E.A., Politis, C.: A game theoretic approach for securing AODV in emergency mobile ad hoc networks. In: Proc. of the 34th IEEE Conference on Local Computer Networks (LCN), Zurich, Switzerland, pp. 985–992 (2009)
-
(2009)
Proc. of the 34th IEEE Conference on Local Computer Networks (LCN)
, pp. 985-992
-
-
Panaousis, E.A.1
Politis, C.2
-
24
-
-
84874825833
-
A game theoretic formulation for intrusion detection in mobile ad hoc networks
-
Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security 2(2), 131–137 (2006)
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 131-137
-
-
Patcha, A.1
Park, J.M.2
-
25
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
. Springer US
-
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, pp. 153–181. Springer US (1996)
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
26
-
-
63149179251
-
Cluster based co-operative game theory approach for intrusion detection in mobile ad-hoc grid
-
Santosh, N., Saranyan, R., Senthil, K.P., Vetriselvi, V.: Cluster based co-operative game theory approach for intrusion detection in mobile ad-hoc grid. In: Proc. of the International Conference on Advanced Computing and Communications (ADCOM), pp. 273–278 (2008)
-
(2008)
Proc. of the International Conference on Advanced Computing and Communications (ADCOM),
, pp. 273-278
-
-
Santosh, N.1
Saranyan, R.2
Senthil, K.P.3
Vetriselvi, V.4
-
27
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas of Communication 24(2), 305–317 (2006)
-
(2006)
IEEE Journal on Selected Areas of Communication
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
29
-
-
34249339428
-
Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis
-
Yu, W., Ji, Z., Liu, K.J.R.: Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis. IEEE Transactions on Information Forensics and Security 2(2), 240–253 (2007)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.2
, pp. 240-253
-
-
Yu, W.1
Ji, Z.2
Liu, K.J.R.3
-
30
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
Yu, W., Liu, K.J.R.: Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(5), 507–521 (2007)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.5
, pp. 507-521
-
-
Yu, W.1
Liu, K.J.R.2
-
31
-
-
44049100110
-
Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach
-
Yu, W., Liu, K.J.R.: Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach. IEEE Transactions on Information Forensics and Security 3(2), 317–330 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 317-330
-
-
Yu, W.1
Liu, K.J.R.2
|