Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
暂无分享,去创建一个
[1] S. W. Roberts. Control chart tests based on geometric moving averages , 2000 .
[2] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[5] Baochun Li,et al. MP-DSR: a QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.
[6] Radha Poovendran,et al. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection , 2011, IEEE/ACM Transactions on Networking.
[7] Guevara Noubir,et al. On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..
[8] M. Stojanovic,et al. Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.
[9] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[10] David J. Thuente,et al. Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .
[11] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[12] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.