暂无分享,去创建一个
[1] Shahram Behzad,et al. Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .
[2] Shahram Jamali,et al. Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .
[3] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[4] Chen Chen,et al. New Method of Energy Efficient Subcarrier Allocation Based on Evolutionary Game Theory , 2018, Mob. Networks Appl..
[5] De-gan Zhang,et al. Novel approach of distributed & adaptive trust metrics for MANET , 2019, Wirel. Networks.
[6] Ren-Hung Hwang,et al. Energy Depletion Attacks in Low Power Wireless Networks , 2019, IEEE Access.
[7] Reza Fotohi,et al. Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..
[8] Shahram Jamali,et al. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.
[9] Yang Xiang,et al. A novel organizing scheme of single topic user group based on trust chain model in social network , 2018, Int. J. Commun. Syst..
[10] Reza Fotohi,et al. A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.
[11] Vladimir Getov,et al. Performance Analysis of Denial-of-Sleep Attack-Prone MAC Protocols in Wireless Sensor Networks , 2018, 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim).
[12] Ting Zhang,et al. Novel reliable routing method for engineering of internet of vehicles based on graph theory , 2018, Engineering Computations.
[13] Guang Li,et al. An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks , 2014, IEEE Transactions on Industrial Informatics.
[14] Yu-ya Cui,et al. A New Algorithm of the Best Path Selection Based on Machine Learning , 2019, IEEE Access.
[15] Yue Dong,et al. A kind of effective data aggregating method based on compressive sensing for wireless sensor network , 2018, EURASIP Journal on Wireless Communications and Networking.
[16] VaradharajanVijay,et al. Intrusion detection techniques in cloud environment , 2017 .
[17] Xiao-huan Liu,et al. Dynamic Analysis for the Average Shortest Path Length of Mobile Ad Hoc Networks Under Random Failure Scenarios , 2019, IEEE Access.
[18] Rituparna Chaki,et al. Lightweight Hierarchical Model for HWSNET , 2011, ArXiv.
[19] Xiang Wang,et al. A Novel Approach to Mapped Correlation of ID for RFID Anti-Collision , 2014, IEEE Transactions on Services Computing.
[20] Xiang Wang,et al. Novel Quick Start (QS) method for optimization of TCP , 2016, Wirel. Networks.
[21] Ting Zhang,et al. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education , 2017, J. Netw. Comput. Appl..
[22] Shahram Behzad,et al. Queue based Job Scheduling algorithm for Cloud computing , 2013 .
[23] Yue Dong,et al. Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning , 2018, J. Netw. Comput. Appl..
[24] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.
[25] Xiao-dan Zhang,et al. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application , 2012, Enterp. Inf. Syst..
[26] G. Padmavathi,et al. Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .
[27] Yen-Chieh Ouyang,et al. A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[28] Reza Fotohi,et al. A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms , 2020, The Journal of Supercomputing.
[29] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[30] Shahram Jamali,et al. An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .
[31] Gerhard P. Hancke,et al. Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.
[32] Lindsay N. Childs. RSA Cryptography and Prime Numbers , 2019 .
[33] Reza Fotohi,et al. A Cluster Based Job Scheduling Algorithm for Grid Computing , 2013 .
[34] Si Liu,et al. Novel PEECR-based clustering routing approach , 2017, Soft Comput..
[35] Shahram Jamali,et al. Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .
[36] Christoph Meinel,et al. Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) , 2019, Comput. Networks.
[37] Vikas Juneja,et al. Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques , 2018 .
[38] Xiaodan Zhang,et al. A Kind of Novel Method of Power Allocation With Limited Cross-Tier Interference for CRN , 2019, IEEE Access.
[39] Shahram Jamali,et al. A Simulative Comparison of DSDV and OLSR Routing Protocols , 2012 .
[40] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .
[41] Jamali Shahram,et al. A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .
[42] Guoqiang Mao,et al. New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.
[43] Shahram Jamali,et al. Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata , 2012, ArXiv.
[44] Shahram Jamali,et al. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .
[45] C. A. Clarotti,et al. Statistical reliability practice from sampling theory to stochastic filtering , 1989 .
[46] Nathalie Mitton,et al. Denial-of-Sleep Attacks against IoT Networks , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).
[47] Reza Fotohi,et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.
[48] Vijay Varadharajan,et al. Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..
[49] Laura Gheorghe,et al. Storm Control Mechanism in Wireless Sensor Networks , 2010, 9th RoEduNet IEEE International Conference.
[50] V. Sumathy,et al. Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks , 2013 .
[51] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[52] Gulshan Kumar,et al. Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks , 2017, J. Netw. Comput. Appl..
[53] Reza Fotohi,et al. An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.
[54] De-gan Zhang,et al. A kind of novel method of service-aware computing for uncertain mobile applications , 2013, Math. Comput. Model..
[55] Luci Pirmez,et al. Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.
[56] De-gan Zhang,et al. A Low Duty Cycle Efficient MAC Protocol Based on Self-Adaption and Predictive Strategy , 2018, Mob. Networks Appl..
[57] Mahalakshmi Gunasekaran,et al. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN , 2017, Secur. Commun. Networks.
[58] Ramjee Prasad,et al. GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network , 2018, Wirel. Pers. Commun..
[59] Shahram Jamali,et al. Defense against Black Hole Attacks on AODV Routing Protocol Using Fuzzy Logic , 2017 .
[60] Ting Zhang,et al. Novel self-adaptive routing service algorithm for application in VANET , 2018, Applied Intelligence.
[61] Christoph Meinel,et al. Countering Three Denial-of-Sleep Attacks on ContikiMAC , 2017, EWSN.
[62] De-gan Zhang. A new approach and system for attentive mobile learning based on seamless migration , 2010, Applied Intelligence.
[63] Shahram Behzad,et al. An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..
[64] Wendi B. Heinzelman,et al. Energy-Harvesting Wireless Sensor Networks (EH-WSNs) , 2018, ACM Trans. Sens. Networks.
[65] Ting Zhang,et al. Novel dynamic source routing protocol (DSR) based on genetic algorithm‐bacterial foraging optimization (GA‐BFO) , 2018, Int. J. Commun. Syst..
[66] Rituparna Chaki,et al. AMC Model for Denial of Sleep Attack Detection , 2012, ArXiv.
[67] Reza Fotohi,et al. NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things , 2020, The Journal of Supercomputing.
[68] De-gan Zhang,et al. New Medical Image Fusion Approach with Coding Based on SCD in Wireless Sensor Network , 2015 .
[69] A. Pravin Renold,et al. Energy efficient secure data collection with path-constrained mobile sink in duty-cycled unattended wireless sensor network , 2019, Pervasive Mob. Comput..
[70] Shahram Jamali,et al. A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .