Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem
暂无分享,去创建一个
M. Poongodi | S. Bose | S. Bose | M. Poongodi
[1] Xi Chen,et al. Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[2] Jin-Hee Cho,et al. Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks , 2010, Wirel. Networks.
[3] S. Bose,et al. Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).
[4] Peter C. Mason,et al. Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.
[5] Muneer O. Bani Yassein,et al. Malicious Nodes Detection in MANETs: Behavioral Analysis Approach , 2012, J. Networks.
[6] Zhiqun Deng,et al. Data Distribution Algorithm Using Time Based Weighted Distributed Hash Tables , 2008, 2008 Seventh International Conference on Grid and Cooperative Computing.
[7] Charles B. Owen,et al. Factors affecting the performance of ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[8] R. Aumann. Agreeing to disagree. , 1976, Nature cell biology.
[9] Sarmistha Neogy,et al. Secure checkpointing-recovery using trusted nodes in MANET , 2013, 2013 4th International Conference on Computer and Communication Technology (ICCCT).
[10] Ramesh Govindan,et al. Improving lookup latency in distributed hash table systems using random sampling , 2005, IEEE/ACM Transactions on Networking.
[11] Lorenz Demey,et al. Agreeing to disagree in probabilistic dynamic epistemic logic , 2013, Synthese.
[12] Poongodi,et al. Advances in Natural and Applied Sciences New Format.docx , 2015 .
[13] Dijiang Huang,et al. STARS: A Statistical Traffic Pattern Discovery System for MANETs , 2014, IEEE Transactions on Dependable and Secure Computing.
[14] J. Trostle. Applying network address encryption to anonymity and preventing data exfiltration , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[15] N. Ganeshkumar,et al. The effective intrusion detection system using optimal feature selection algorithm , 2015 .
[16] Tameem Eissa,et al. Enhancing MANET Security Using Secret Public Keys , 2009, 2009 International Conference on Future Networks.
[17] Feng Luo,et al. A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles , 2004, Bioinform..