Possibility and Necessity Measures to Enhance Reliability and Cooperation in MANETS
暂无分享,去创建一个
[1] George J. Klir,et al. Fuzzy sets and fuzzy logic - theory and applications , 1995 .
[2] Juan-Carlos Cano,et al. Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog , 2012, IEEE Communications Letters.
[3] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[4] Tanapat Anusas-amornkul. On Detection Mechanisms and Their Performance for Packet Dropping Attack in Ad Hoc Networks , 2008 .
[5] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[6] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[9] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[10] Christos Dimitrakakis,et al. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.
[11] Laurence Tianruo Yang,et al. Fuzzy Logic with Engineering Applications , 1999 .
[12] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[13] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[14] George J. Klir,et al. Fuzzy sets, uncertainty and information , 1988 .
[15] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[16] Juan-Carlos Cano,et al. Evaluation of collaborative selfish node detection in MANETS and DTNs , 2012, MSWiM '12.
[17] Panagiotis Papadimitratos,et al. The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .
[18] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[19] Benxiong Huang,et al. COSR: A Reputation-Based Secure Route Protocol in MANET , 2010, EURASIP J. Wirel. Commun. Netw..
[20] Milena Radenkovic,et al. Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[21] N. H. Saeed,et al. Intelligent Manet Optimisation System , 2012 .
[22] Turgay Korkmaz,et al. Enhancing role-based trust management with a reputation system for MANETs , 2011, EURASIP J. Wirel. Commun. Netw..
[23] Maysam F. Abbod,et al. IMAN: An Intelligent MANET routing system , 2010, 2010 17th International Conference on Telecommunications.
[24] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[25] Chun-Ta Li,et al. A secure routing protocol with node selfishness resistance in MANETs , 2012, Int. J. Mob. Commun..