A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs
暂无分享,去创建一个
Juan-Carlos Cano | Pietro Manzoni | Carlos Miguel Tavares Calafate | Enrique Hernández-Orallo | Manuel D. Serrat Olmos | C. Calafate | P. Manzoni | E. Hernández-Orallo | Juan-Carlos Cano
[1] Juan-Carlos Cano,et al. Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters , 2010, OTM Workshops.
[2] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[3] Minglu Li,et al. Recognizing Exponential Inter-Contact Time in VANETs , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[5] Pietro Manzoni,et al. Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs , 2010, 2010 IEEE International Conference on Communications Workshops.
[6] Ger Koole,et al. The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.
[7] Ralf Steinmetz,et al. On the effect of node misbehavior in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[8] Lieguang Zeng,et al. The Impact of Node Selfishness on Multicasting in Delay Tolerant Networks , 2011, IEEE Transactions on Vehicular Technology.
[9] Qinghua Li,et al. Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[10] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[11] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[12] Qinghua Li,et al. Multicasting in delay tolerant networks: a social network perspective , 2009, MobiHoc '09.
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Boudewijn R. Haverkort,et al. The Mean Value of the Maximum , 2002, PAPM-PROBMIV.
[15] S. Balasubramanian. Assessing the Vulnerability of DTN Data Relaying Schemes to Node Selfishness , 2012 .
[16] Hongseok Yoo,et al. The controversy of Selfish nodes in ad hoc networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[17] Sergio Palazzo,et al. Opportunistic and Delay-Tolerant Networks , 2011, EURASIP Journal on Wireless Communications and Networking.
[18] Jean-Yves Le Boudec,et al. Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2007, IEEE Transactions on Mobile Computing.