A Multiagent Self-healing System against Security Incidents in MANETs
暂无分享,去创建一个
[1] Kamaljit I. Lakhtaria. Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends , 2012 .
[2] Pedro García-Teodoro,et al. A Security Response Approach Based on the Deployment of Mobile Agents , 2013, PAAMS.
[3] Ramjee Prasad,et al. Effects of malicious attacks in mobile ad-hoc networks , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[4] Jeffrey S. Smith,et al. Optimizing tactical military MANETs with a specialized PSO , 2010, IEEE Congress on Evolutionary Computation.
[5] Farrukh Aslam Khan,et al. Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Ani Taggu,et al. TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[7] Abdullah Konak,et al. Connectivity management in mobile ad hoc networks using particle swarm optimization , 2011, Ad Hoc Networks.
[8] Sarmistha Neogy,et al. Mobile Agent Security in MANET Using Reputation , 2011 .
[9] Abdul Hanan Abdullah,et al. A Survey of MANET Survivability Routing Techniques , 2013 .
[10] Eric Renault,et al. Advances in Parallel Distributed Computing , 2011 .
[11] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[12] Yasir Abdelgadir Mohamed,et al. Immune-inspired framework for securing hybrid MANET , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.
[13] Chun-Cheng Lin,et al. Dynamic router node placement in wireless mesh networks: A PSO approach with constriction coefficient and its convergence analysis , 2013, Inf. Sci..
[14] Hongbin Zhang,et al. Research on the survivability based on the algorithms of the key point detection and compensation in Ad Hoc networks , 2013, 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering.
[15] Goutham Kamath,et al. Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network , 2013, Ad Hoc Networks.
[16] Yves Demazeau,et al. Advances on Practical Applications of Agents and Multi-Agent Systems - 10th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2012, Salamanca, Spain, 28-30 March, 2012 , 2012, Advances in Intelligent and Soft Computing.
[17] Rituparna Chaki,et al. Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent , 2011 .
[18] Paulo Leitão,et al. Past, Present, and Future of Industrial Agent Applications , 2013, IEEE Transactions on Industrial Informatics.
[19] Dhinaharan Nagamalai,et al. Recent Trends in Wireless and Mobile Networks , 2011 .