Information security in computer networks with dynamic topology
暂无分享,去创建一个
[1] Jonathan Loo,et al. Framework for intrusion detection in IEEE 802.11 wireless mesh networks , 2010, Int. Arab J. Inf. Technol..
[2] Celia Li,et al. Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..
[3] Xinheng Wang. Wireless mesh networks , 2008, Journal of telemedicine and telecare.
[4] Zhang Minqing,et al. The research on certificateless hierarchical key management in wireless mesh network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[5] United Arab Emirates,et al. Dealing with Sinkhole Attacks in Wireless Sensor Networks , 2013 .
[6] Rupinder Kaur,et al. Black Hole and Greyhole Attack in Wireless Mesh Network , 2014 .
[7] Xia Wang,et al. A heterogeneity-aware framework for group key management in wireless mesh networks , 2008, SecureComm.
[8] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[9] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[10] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[11] Simon Pietro Romano,et al. A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Zonghua Zhang,et al. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[13] Yuguang Fang,et al. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[14] Jason Smith,et al. Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks , 2006, ACSW.
[15] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[16] Reza Curtmola,et al. Secure Routing in Wireless Mesh Networks , 2011, Encyclopedia of Cryptography and Security.