Diagnosing and Penalizing MAC Layer Misbehavior in Wireless Networks
暂无分享,去创建一个
[1] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[2] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[3] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[4] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[5] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[6] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[7] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[8] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[9] Jerzy Konorski,et al. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations , 2002, NETWORKING.
[10] L. F. Wilson,et al. Analysis of distributed intrusion detection systems using Bayesian methods , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).
[11] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[12] Stefan Savage,et al. Robust congestion signaling , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[13] Stephen B. Wicker,et al. Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..
[14] Jerzy Konorski,et al. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting , 2001, PROMS.
[15] Stephen B. Wicker,et al. Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[16] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[17] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[18] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[19] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[20] Stefan Savage,et al. TCP congestion control with a misbehaving receiver , 1999, CCRV.
[21] Noam Nisan,et al. Algorithms for Selfish Agents , 1999, STACS.
[22] Ron Lavi,et al. Algorithmic Mechanism Design , 2008, Encyclopedia of Algorithms.
[23] Scott Shenker,et al. Design guidelines for robust Internet protocols , 2003, CCRV.
[24] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[25] Pietro Michiardi,et al. Making greed work in mobile ad hoc networks , 2002 .
[26] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[27] Kevin R. Fall,et al. Ns: notes and documentation , 1997 .
[28] Somesh Jha,et al. A model checker for authentication protocols , 1997 .
[29] R. Jain,et al. Fairness, call es-tablishment latency and other performance metrics , 1996 .