A Survey on Security Vulnerabilities in Wireless Ad Hoc High Performance Clusters
暂无分享,去创建一个
[1] Rahul Pradhan,et al. Improved AODV Performance in DOS and Black Hole Attack Environment , 2015 .
[2] S. Singh,et al. Heritability and Genetic Advance Estimation From Parental Lines of Hybrid Rice , 2012 .
[3] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[4] Michael Kemelmakher,et al. Preserving Mutual Interests in High Performance Computing Clusters , 1999, Informatica.
[5] Mohammed H. Almeshekah,et al. Defending against Password Exposure using Deceptive Covert Communication , 2015 .
[6] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[8] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[9] Jonathan Loo,et al. Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802-11 Wireless Mesh Networks , 2009, J. Digit. Content Technol. its Appl..
[10] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[11] Kuei-Fang Hsiao,et al. Integrating body language movements in augmented reality learning environment , 2011, Human-centric Computing and Information Sciences.
[12] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[13] Sanjay P. Ahuja,et al. A Survey on Wireless Grid Computing , 2006, The Journal of Supercomputing.