Detection and Control of DDOS Attacks over Reputation and Score Based MANET
暂无分享,去创建一个
[1] Ivan Stojmenovic,et al. Ad hoc networks security , 2004 .
[2] Ranvijay,et al. A REVIEW PAPER ON AD HOC NETWORK SECURITY , 2007 .
[3] Gurjinder Kaur,et al. Distributed Denial of Service Attacks in Mobile Adhoc Networks , 2011 .
[4] Anup Kumar,et al. A framework for integrated Internet and ad hoc network security , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[5] S. Muftic,et al. Security Architecture for Open Distributed Systems , 1993 .
[6] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[7] Ali Ghaffari,et al. Vulnerability and security of mobile ad hoc networks , 2006 .
[8] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[10] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[11] SLID: A secure lowest-ID clustering algorithm , 2008, Wuhan University Journal of Natural Sciences.
[12] Jung-Min Park,et al. A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[13] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[14] J. Redi,et al. A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.
[15] Mieso K. Denko. A Localized Architecture for Detecting Denial of Service (DoS) Attacks in Wireless AD Hoc Networks , 2005, INTELLCOMM.
[16] Sven Dietrich,et al. Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.
[17] R. Power. CSI/FBI computer crime and security survey , 2001 .
[18] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[19] Yuebin Bai,et al. Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[20] Robin Kravets,et al. Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[21] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[22] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[23] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[24] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[25] Pietro Michiardi,et al. Security in ad hoc networks , 2003 .
[26] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[27] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[28] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[29] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.