An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
暂无分享,去创建一个
[1] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[2] Sheng Zhong,et al. Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach , 2011, IEEE Transactions on Vehicular Technology.
[3] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[4] Kin K. Leung,et al. A Trustworthiness-based QoS routing protocol for wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[5] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Chris McDonald,et al. Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .
[7] Isaac Woungang,et al. Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks , 2012, FPS.
[8] Patrick Seemann,et al. Matrix Factorization Techniques for Recommender Systems , 2014 .
[9] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[10] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[11] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[12] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[13] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[14] P. Venkata Krishna,et al. A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks , 2011, The Journal of Supercomputing.
[15] Djamel Djenouri,et al. Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .
[16] Jamal N. Al-Karaki,et al. Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..
[17] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[18] Guy Pujolle,et al. Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[19] Ming Gu,et al. Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.
[20] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[21] Peng Zhou,et al. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.
[22] K. J. Ray Liu,et al. HADOF: defense against routing disruptions in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[23] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[24] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[25] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[26] Yue Wu,et al. Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.
[27] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[28] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[29] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.