Assessing the Severity of Attacks in Wireless Networks
暂无分享,去创建一个
[1] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[2] Richard P. Martin,et al. The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study , 2006, DCOSS.
[3] Stefan Savage,et al. TCP congestion control with a misbehaving receiver , 1999, CCRV.
[4] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[5] Jeril Kuriakose,et al. Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks , 2015, SSCC.
[6] Jussi Kangasharju,et al. Real-world sybil attacks in BitTorrent mainline DHT , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[7] Panayiotis Kotzanikolaou,et al. Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[8] Jeril Kuriakose,et al. A Review on Mobile Sensor Localization , 2014, SSCC.
[9] Xun Wang,et al. iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[11] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .