Towards a Hierarchical Temporal Memory Based Self-managed Dynamic Trust Replication Mechanism in Cognitive Mobile Ad-Hoc Networks
暂无分享,去创建一个
[1] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[2] Jesse Hoey,et al. Hierarchical unsupervised learning of facial expression categories , 2001, Proceedings IEEE Workshop on Detection and Recognition of Events in Video.
[3] Jingyu Zhou,et al. Detecting attacks that exploit application-logic errors through application-level auditing , 2004, 20th Annual Computer Security Applications Conference.
[4] J. Hawkins,et al. On Intelligence , 2004 .
[5] M. Ben-Ari,et al. Virtual trees for the byzantine generals algorithm , 2004, SIGCSE '04.
[6] Giorgio Ventre,et al. Flexible Node Design and Implementation for Self Aware Networks , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).
[7] Gang Yin,et al. A Dynamic Trust Metric for P2P Systems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[8] Mukesh Singhal,et al. A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[9] Patrice Godefroid. Random testing for security: blackbox vs. whitebox fuzzing , 2007, RT '07.
[10] Herbert H. Thompson,et al. The Software Vulnerability Guide , 2007 .
[11] Qusay H. Mahmoud,et al. Cognitive Networks: Towards Self-Aware Networks , 2007 .
[12] Roger K. Moore. PRESENCE: A Human-Inspired Architecture for Speech-Based Human-Machine Interaction , 2007, IEEE Transactions on Computers.
[13] Peter Henderson,et al. Selecting a distributed agreement algorithm , 2007, SAC '07.
[14] S. Padmini,et al. Security Assessment of Power Systems Using Artificial Neural Networks - A Comparison between Euclidean Distance Based Learning and Supervised Learning Algorithms , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[15] Ji Yi,et al. A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment , 2008, 2008 International Conference on Computer Science and Software Engineering.
[16] Cheng Zhang,et al. A Network Security Risk Assessment Framework Based on Game Theory , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[17] Xiaohong Li,et al. An Attack Scenario Based Approach for Software Security Testing at Design Stage , 2008, 2008 International Symposium on Computer Science and Computational Technology.
[18] T. Rajendran,et al. Secure anonymous routing in ad hoc networks , 2008, Bangalore Compute Conf..
[19] R. J. Rodríguez. Byzantine generals' problem driven dynamic trust replication method for cognitive mobile ad hoc networks (MANETs) , 2009 .
[20] Wouter Joosen,et al. Protecting global and static variables from buffer overflow attacks without overhead , 2006 .
[21] Ricardo J. Rodriguez,et al. Automated risk assessment: a hierarchical temporal memory approach , 2010 .
[22] C. Gupta,et al. SECURITY ISSUES IN WIRELESS SENSOR NETWORK , 2011 .