Defining Categories to Select Representative Attack Test-Cases in MANETs
暂无分享,去创建一个
[1] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[2] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[3] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[4] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[5] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[6] Mostafa Azizi,et al. Amelioration of Attack Classifications for Evaluating and Testing Intrusion Detection System , 2010 .
[7] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[8] Jaydip Sen,et al. Reputation- and Trust-Based Systems for Wireless Self-organizing Networks , 2011, ArXiv.
[9] Ahmed Patel,et al. Comparative review study of reactive and proactive routing protocols in MANETs , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.
[10] R. Dorf,et al. The handbook of ad hoc wireless networks , 2003 .
[11] Michel Barbeau,et al. Handling Security Threats to the RFID System of EPC Networks , 2016 .
[12] Matthias Grochtmann,et al. Test Case Design Using Classification Trees and the Classification-Tree Editor CTE , 1995 .
[13] N. Paulauskas,et al. Computer System Attack Classification , 2006 .
[14] Xiaoyan Hong,et al. A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[15] Panagiotis Papadimitratos,et al. Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.
[16] Mohit Kumar,et al. An Overview of MANET: History, Challenges and Applications , 2012 .
[17] Martin Mauve,et al. A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..
[18] John A. Clark,et al. Security Threats in Mobile Ad Hoc Networks , 2009 .
[19] Victor Govindaswamy,et al. Survey of Recent Position Based Routing Mobile Ad-hoc Network Protocols , 2011, 2011 UkSim 13th International Conference on Computer Modelling and Simulation.
[20] Arobinda Gupta,et al. Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey , 2010 .
[21] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[22] Glenford J. Myers,et al. Art of Software Testing , 1979 .
[23] Dominique Alessandri,et al. Attack-class-based analysis of intrusion detection systems , 2004 .
[24] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..