Design and Development of CTSR with Direct & Indirect Observations of MANET Applications
暂无分享,去创建一个
[1] Peter C. Mason,et al. Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.
[2] Kalyani Handal,et al. Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning , 2018 .
[3] Yuguang Fang,et al. SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.
[4] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[5] Bu-Sung Lee,et al. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.
[6] Roch H. Glitho,et al. A Novel Overlay-Based Failure Detection Architecture for MANET Applications , 2007, 2007 15th IEEE International Conference on Networks.
[7] Hirozumi Yamaguchi,et al. MobiREAL simulator-evaluating MANET applications in real environments , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[8] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Lotfi A. Zadeh,et al. Review of A Mathematical Theory of Evidence , 1984 .
[10] Qi Shi,et al. Collaborative Intrusion Detection in Federated Cloud Environments , 2015 .
[11] William Johnson,et al. A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique , 2014, EURASIP J. Wirel. Commun. Netw..
[12] J. Martin Leo Manickam,et al. Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[13] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[14] Luiz A. DaSilva,et al. Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks , 2010, IEEE Transactions on Computers.
[15] R. Yager. On the dempster-shafer framework and new combination rules , 1987, Inf. Sci..
[16] F. Richard Yu,et al. Security enhancement for mobile ad hoc networks routing with OLSRv2 , 2013, Defense, Security, and Sensing.
[17] Ioannis Lambadaris,et al. Trust establishment in cooperative wireless relaying networks , 2014, Wirel. Commun. Mob. Comput..
[18] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..