Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks
暂无分享,去创建一个
[1] Xianbin Wang,et al. Wireless Sensor Network Reliability and Security in Factory Automation: A Survey , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[2] Mun Choon Chan,et al. Robustness of DTN against routing attacks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[3] Dario Floreano,et al. Gaining Insight into Quality Diversity , 2016, GECCO.
[4] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[5] Stephen Farrell,et al. DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.
[6] Kenneth O. Stanley,et al. Confronting the Challenge of Quality Diversity , 2015, GECCO.
[7] Nicholas R. Jennings,et al. Self-organized routing for wireless microsensor networks , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[8] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[9] Jie Wu,et al. Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] Doina Bucur,et al. Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms , 2016, Appl. Soft Comput..
[11] Jie Tang,et al. Influence Maximization in Dynamic Social Networks , 2013, 2013 IEEE 13th International Conference on Data Mining.
[12] Rabin K. Patra,et al. Routing in a delay tolerant network , 2004, SIGCOMM '04.
[13] Ke Xu,et al. A Survey of Social-Aware Routing Protocols in Delay Tolerant Networks: Applications, Taxonomy and Design-Related Issues , 2014, IEEE Communications Surveys & Tutorials.
[14] Cristina Alcaraz,et al. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[15] Doina Bucur,et al. Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks , 2015, EvoApplications.
[16] Jean-Baptiste Mouret,et al. Illuminating search spaces by mapping elites , 2015, ArXiv.
[17] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[18] Xin Yao,et al. Fast Evolution Strategies , 1997, Evolutionary Programming.
[19] Richard R. Brooks,et al. Mobile Network Analysis Using Probabilistic Connectivity Matrices , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[20] John Burgess,et al. Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.
[21] Giovanni Squillero,et al. Evolutionary Optimization: the µGP toolkit , 2011 .
[22] Giovanni Squillero,et al. Divergence of character and premature convergence: A survey of methodologies for promoting diversity in evolutionary optimization , 2016, Inf. Sci..
[23] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[24] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[25] Doina Bucur,et al. The impact of topology on energy consumption for collection tree protocols: An experimental assessment through evolutionary computation , 2014, Appl. Soft Comput..
[26] Kenneth O. Stanley,et al. Abandoning Objectives: Evolution Through the Search for Novelty Alone , 2011, Evolutionary Computation.