-
1
-
-
42549125147
-
A Petri net design of command filters for semiautonomous mobile sensor networks
-
Apr.
-
J.-S. Lee, "A Petri net design of command filters for semiautonomous mobile sensor networks", IEEE Trans. Ind. Electron., vol. 55, no. 4, pp. 1835-1841, Apr. 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.4
, pp. 1835-1841
-
-
Lee, J.-S.1
-
2
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
May
-
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs", IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
-
3
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255-265.
-
(2000)
Proc. 6th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
4
-
-
84944878354
-
-
Boca Raton, FL: CRC
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37.
-
(1996)
Handbook of Applied Cryptography
, pp. T-37
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
5
-
-
38549088052
-
Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network
-
Glasgow, Scotland, Jun. 24-28
-
N. Nasser and Y. Chen, "Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network", in Proc. IEEE Int. Conf. Commun., Glasgow, Scotland, Jun. 24-28, 2007, pp. 1154-1159.
-
(2007)
Proc. IEEE Int. Conf. Commun.
, pp. 1154-1159
-
-
Nasser, N.1
Chen, Y.2
-
6
-
-
2442417706
-
On intrusion detection and response for mobile ad hoc networks
-
J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, "On intrusion detection and response for mobile ad hoc networks", in Proc. IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747-752.
-
(2004)
Proc. IEEE Int. Conf. Perform., Comput., Commun.
, pp. 747-752
-
-
Parker, J.1
Undercoffer, J.2
Pinkston, J.3
Joshi, A.4
-
7
-
-
84944714533
-
Collaborative security architecture for black hole attack prevention in mobile ad hoc networks
-
Patcha and A. Mishra, "Collaborative security architecture for black hole attack prevention in mobile ad hoc networks", in Proc. Radio Wireless Conf., 2003, pp. 75-78.
-
(2003)
Proc. Radio Wireless Conf.
, pp. 75-78
-
-
Patcha1
Mishra, A.2
-
8
-
-
33646552392
-
Secure routing and intrusion detection in ad hoc networks
-
Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure routing and intrusion detection in ad hoc networks", in Proc. 3rd Int. Conf. Pervasive Comput. Commun., 2005, pp. 191-199.
-
(2005)
Proc. 3rd Int. Conf. Pervasive Comput. Commun.
, pp. 191-199
-
-
Patwardhan, J.P.1
Joshi, A.2
Iorga, M.3
Karygiannis, T.4
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1983.
-
(1983)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
10
-
-
70349669239
-
Video transmission enhancement in presence ofmisbehaving nodes in MANETs
-
Oct.
-
T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A. Mahmoud, "Video transmission enhancement in presence ofmisbehaving nodes in MANETs", Int. J. Multimedia Syst., vol. 15, no. 5, pp. 273-282, Oct. 2009.
-
(2009)
Int. J. Multimedia Syst.
, vol.15
, Issue.5
, pp. 273-282
-
-
Sheltami, T.1
Al-Roubaiey, A.2
Shakshuki, E.3
Mahmoud, A.4
-
11
-
-
0036957315
-
ARIADNE: A secure ondemand routing protocol for ad hoc networks
-
Atlanta, GA
-
Y. Hu, A. Perrig, and D. Johnson, "ARIADNE: A secure ondemand routing protocol for ad hoc networks", in Proc. 8th ACM Int. Conf. Mobi Com, Atlanta, GA, 2002, pp. 12-23.
-
(2002)
Proc. 8th ACM Int. Conf. Mobi Com
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
12
-
-
76849098570
-
A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator
-
Mar.
-
Tabesh and L. G. Frechette, "A low-power stand-alone adaptive circuit for harvesting energy from a piezoelectric micropower generator", IEEE Trans. Ind. Electron., vol. 57, no. 3, pp. 840-849, Mar. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.3
, pp. 840-849
-
-
Tabesh1
Frechette, L.G.2
-
14
-
-
0033357103
-
Securing ad-hoc networks
-
Nov./Dec.
-
L. Zhou and Z. Haas, "Securing ad-hoc networks", IEEE Netw., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Netw.
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
16
-
-
0000629443
-
Dynamic Source Routing in ad hoc wireless networks
-
Norwell, MA: Kluwer, ch. 5
-
Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless networks", in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson1
Maltz, D.2
-
17
-
-
84925317189
-
-
Ts, Paris, France, Nov. 8-10
-
Ts", in Proc. 12th Int. Conf. ii WAS, Paris, France, Nov. 8-10, 2010, pp. 216-222.
-
(2010)
Proc. 12th Int. Conf. Ii WAS
, pp. 216-222
-
-
-
18
-
-
79956043667
-
Detecting misbehaving nodesin MANETs
-
Paris, France, Nov. 8-10
-
N. Kang, E. Shakshuki, and T. Sheltami, "Detecting misbehaving nodesin MANETs", in Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8-10, 2010, pp. 216-222.
-
(2010)
Proc. 12th Int. Conf iiWAS
, pp. 216-222
-
-
Kang, N.1
Shakshuki, E.2
Sheltami, T.3
|