-
2
-
-
61349175330
-
Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks
-
J. Liu, F. Yu, C.-H. Lung, and H. Tang, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806-815, 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.2
, pp. 806-815
-
-
Liu, J.1
Yu, F.2
Lung, C.-H.3
Tang, H.4
-
3
-
-
84863962542
-
Joint topology control and security in mobile ad hoc networks with cooperative communications
-
Q. Guan, F. Yu, S. Jiang, and V. Leung, "Joint topology control and security in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674-2685, 2012.
-
(2012)
IEEE Trans. Veh. Tech.
, vol.61
, Issue.6
, pp. 2674-2685
-
-
Guan, Q.1
Yu, F.2
Jiang, S.3
Leung, V.4
-
4
-
-
84897912432
-
A mean field game theoretic approach for security enhancements in mobile ad hoc networks
-
Y. Wang, F. Yu, H. Tang, and M. Huang, "A mean field game theoretic approach for security enhancements in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1616-1627, 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.3
, pp. 1616-1627
-
-
Wang, Y.1
Yu, F.2
Tang, H.3
Huang, M.4
-
5
-
-
84891584375
-
-
2nd Edition. Wiley-IEEE Press
-
S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Mobile Ad Hoc Networking: The Cutting Edge Directions, 2nd Edition. Wiley-IEEE Press, 2013.
-
(2013)
Mobile Ad Hoc Networking: The Cutting Edge Directions
-
-
Basagni, S.1
Conti, M.2
Giordano, S.3
Stojmenovic, I.4
-
7
-
-
84909606246
-
Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
-
Feb. accepted for publication
-
Z. Wei, H. Tang, F. Yu, M. Wang, and P. Mason, "Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning," IEEE Trans. Veh. Tech., Feb. 2014. accepted for publication.
-
(2014)
IEEE Trans. Veh. Tech
-
-
Wei, Z.1
Tang, H.2
Yu, F.3
Wang, M.4
Mason, P.5
-
8
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
J. H. Cho, A. Swami, and I. R. Chen, "A survey on trust management for mobile ad hoc networks," IEEE Commun. Surveys & Tutorials, vol. 13, no. 4, pp. 562-583, 2011.
-
(2011)
IEEE Commun. Surveys & Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
11
-
-
57649208449
-
BNWSN: Bayesian network trust model for wireless sensor networks
-
(Amman), Aug.
-
M. Momani, S. Challa, and R. Alhmouz, "BNWSN: Bayesian network trust model for wireless sensor networks," in Proc. MIC-CCA 2008, (Amman), Aug. 2008.
-
(2008)
Proc. MIC-CCA 2008
-
-
Momani, M.1
Challa, S.2
Alhmouz, R.3
-
12
-
-
34250782069
-
A Bayesian network based trust model for improving collaboration in mobile ad hoc networks
-
(Hanoi, Vietnam), Mar.
-
C. T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," in Proc. IEEE Research, Innovation and Vision for the Future, (Hanoi, Vietnam), Mar. 2007.
-
(2007)
Proc. IEEE Research, Innovation and Vision for the Future
-
-
Nguyen, C.T.1
Camp, O.2
Loiseau, S.3
-
13
-
-
84912555498
-
Bayesian network trust model in peer-to-peer networks
-
(Melbourne, Australia), Jul.
-
Y. Wang and J. Vassileva, "Bayesian network trust model in peer-to-peer networks," in Proc. AAMAS'03, (Melbourne, Australia), Jul. 2003.
-
(2003)
Proc. AAMAS'03
-
-
Wang, Y.1
Vassileva, J.2
-
15
-
-
58049134979
-
A bayesian filter to detect misbehaving nodes in manets
-
(Tangier, Morocco), Nov.
-
Y. Beghriche, V. Toubiana, and H. Labiod, "A bayesian filter to detect misbehaving nodes in manets," in Proc. NTMS'08, (Tangier, Morocco), Nov. 2008.
-
(2008)
Proc. NTMS'08
-
-
Beghriche, Y.1
Toubiana, V.2
Labiod, H.3
-
16
-
-
80052194373
-
Bayesian based confidence model for trust inference in manets
-
(Chennai, Tamil Nadu, India), Jun.
-
B. Elizabeth, R. Aaishwarya, P. Kiruthika, M. Shrada, A. Prakash, and V. Uthariaraj, "Bayesian based confidence model for trust inference in manets," in Proc. IEEE ICRTIT'11, (Chennai, Tamil Nadu, India), Jun. 2011.
-
(2011)
Proc. IEEE ICRTIT'11
-
-
Elizabeth, B.1
Aaishwarya, R.2
Kiruthika, P.3
Shrada, M.4
Prakash, A.5
Uthariaraj, V.6
-
17
-
-
84891816433
-
A QoS-based trust approach for service selection and composition via bayesian networks
-
(Santa Clara, CA, USA), Jun.
-
M. Mehdi, N. Bouguila, and J. Bentahar, "A QoS-based trust approach for service selection and composition via bayesian networks," in Proc. IEEE ICWS'13, (Santa Clara, CA, USA), Jun. 2013.
-
(2013)
Proc. IEEE ICWS'13
-
-
Mehdi, M.1
Bouguila, N.2
Bentahar, J.3
-
18
-
-
77956948315
-
A survey on trust and reputation management systems in wireless communications
-
H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, "A survey on trust and reputation management systems in wireless communications," Proc. IEEE, vol. 98, no. 10, pp. 1755-1772, 2010.
-
(2010)
Proc. IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
Miao, C.3
Leung, C.4
Niyato, D.5
-
19
-
-
0002351377
-
Recommender systems in e-commerce
-
(Denver, Colorado, USA)
-
J. B. Schafer, J. Konstan, and J. Riedl, "Recommender systems in e-commerce," in Proc. ACM EC '99, (Denver, Colorado, USA), 1999.
-
(1999)
Proc. ACM EC '99
-
-
Schafer, J.B.1
Konstan, J.2
Riedl, J.3
-
20
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
(Alexandria, VA, USA), Nov.
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs," in Proc. 3rd ACM Workshop on SASN'05, (Alexandria, VA, USA), Nov. 2005.
-
(2005)
Proc. 3rd ACM Workshop on SASN'05
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
22
-
-
0026374073
-
Bayesian networks without tears
-
E. Charniak, "Bayesian networks without tears," AI Magazine, vol. 12, no. 4, pp. 50-63, 1991.
-
(1991)
AI Magazine
, vol.12
, Issue.4
, pp. 50-63
-
-
Charniak, E.1
-
24
-
-
84881134371
-
Security enhancement for mobile ad hoc networks routing with OLSRv2
-
(Baltimore, MD, USA), Apr.
-
Z. Wei, H. Tang, F. R. Yu, and M. Wang, "Security enhancement for mobile ad hoc networks routing with OLSRv2," in Proc. SPIE Defence, Security, and Sensing 2013, (Baltimore, MD, USA), Apr. 2013.
-
(2013)
Proc. SPIE Defence, Security, and Sensing 2013
-
-
Wei, Z.1
Tang, H.2
Yu, F.R.3
Wang, M.4
-
25
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
(Paris, France), Nov.
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. IEEE International Conference on Network Protocols (ICNP), (Paris, France), Nov. 2002.
-
(2002)
Proc. IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
|