A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks
暂无分享,去创建一个
Lyes Khoukhi | Rida Khatoun | Dominique Gaïti | Youcef Begriche | Mohammad Rmayti | R. Khatoun | L. Khoukhi | D. Gaïti | Y. Begriche | M. Rmayti
[1] Bu-Sung Lee,et al. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.
[2] Ba-Ngu Vo,et al. A Tutorial on Bernoulli Filters: Theory, Implementation and Applications , 2013, IEEE Transactions on Signal Processing.
[3] Christos Dimitrakakis,et al. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.
[4] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[5] Lyes Khoukhi,et al. Denial of Service (DoS) attacks detection in MANETs through statistical models , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[6] Levent Ertaul,et al. Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs) , 2009, Security and Management.
[7] Lyes Khoukhi,et al. Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers , 2014, 2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT).
[8] Juliette Dromard,et al. A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network , 2013, ICT 2013.
[9] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[10] Edwin Hsing-Mean Sha,et al. Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..
[11] Rida Khatoun. ASROP : AD HOC Secure Routing Protocol , 2012 .
[12] Xiaoping Li,et al. Trust based routing mechanism for securing OSLR-based MANET , 2015, Ad Hoc Networks.
[13] Peter D. Hoff,et al. A First Course in Bayesian Statistical Methods , 2009 .
[14] Michael P. Howarth,et al. An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.
[15] Vanita Bokhare,et al. A secure NCPR for reducing routing overhead in MANET , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).
[16] Juliette Dromard,et al. A statistical trust system in wireless mesh networks , 2016, Ann. des Télécommunications.
[17] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[18] Konrad Jacobs,et al. Lecture notes on ergodic theory , 1963 .
[19] Vijay Laxmi,et al. JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET , 2015, J. Inf. Secur. Appl..
[20] Paolo Bellavista,et al. Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.
[21] Neri Merhav,et al. Hidden Markov processes , 2002, IEEE Trans. Inf. Theory.
[22] Bo Wang,et al. A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..
[23] Gabriel Maciá-Fernández,et al. A model of data forwarding in MANETs for lightweight detection of malicious packet dropping , 2015, Comput. Networks.
[24] B. Solhaug,et al. Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).