An energy efficient flexible delay tolerant network with adaptive secured framework (ASF-DTN)
暂无分享,去创建一个
[1] Harry Eugene Stanley,et al. Robustness of interdependent networks under targeted attack , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[2] Savitha,et al. Detecting and Eliminating Grey Hole Attack in Delay Tolerant Network , 2016 .
[3] Karthikeyan Bhargavan,et al. Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH , 2016, NDSS.
[4] Sarawagya Singh,et al. A SURVEY OF MISBEHAVIORS OF NODE AND ROUTING ATTACK IN DELAY TOLERANT NETWORK , 2015 .
[5] Pablo Rodriguez,et al. Fair Routing in Delay Tolerant Networks , 2009, IEEE INFOCOM 2009.
[6] K. Vengatesan,et al. Recommendation system based on statistical analysis of ranking from user , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[7] Poonam Sharma,et al. Selfish nodes detection in delay tolerant networks , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).
[8] Jie Wu,et al. Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.
[9] Erman Ayday,et al. Trust management and adversary detection for delay tolerant networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[10] Chai Kiat Yeo,et al. Detecting colluding blackhole and greyhole attack in Delay Tolerant Networks , 2016, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[11] Hong Cheng,et al. Measuring robustness of complex networks under MVC attack , 2012, CIKM.
[12] Haibo Zhang,et al. Mitigating Blackhole Attacks in Delay Tolerant Networks , 2012, 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies.
[13] Sajal K. Das,et al. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2011, IEEE Transactions on Mobile Computing.
[14] Feng Xia,et al. ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks , 2017, IEEE/ACM Transactions on Networking.
[15] S. Bhargavi,et al. The Impact of Collusion Attacks in WSN with Secure Data Aggregation System , 2015 .
[16] Luca Maria Gambardella,et al. Ant Algorithms for Discrete Optimization , 1999, Artificial Life.
[17] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.