A Study on False Channel Condition Reporting Attacks in Wireless Networks
暂无分享,去创建一个
[1] John Launer. Odyssey , 2012, Postgraduate Medical Journal.
[2] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[3] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[4] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[5] Bernhard Plattner,et al. On the vulnerability of the proportional fairness scheduler to retransmission attacks , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Haiyun Luo,et al. UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.
[7] Hui Zang,et al. A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks , 2007, PAM.
[8] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[9] Amitava Ghosh,et al. IEEE 802.16e system performance: analysis and simulations , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[10] Yih-Chun Hu,et al. Secure Unified Cellular Ad Hoc Network Routing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[11] Josephine Antoniou,et al. A discrete event based simulation environment for enhanced UMTS 3rd generation networks , 2004, SAC '04.
[12] Elza Erkip,et al. Increasing uplink capacity via user cooperation diversity , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[13] Cristina Nita-Rotaru,et al. JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks , 2009, IEEE Transactions on Dependable and Secure Computing.
[14] S. Russel and P. Norvig,et al. “Artificial Intelligence – A Modern Approach”, Second Edition, Pearson Education, 2003. , 2015 .
[15] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[16] A. Jalali,et al. Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[17] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[18] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[19] Jitendra Padhye,et al. Comparison of routing metrics for static multi-hop wireless networks , 2004, SIGCOMM '04.
[20] Hao Chen,et al. Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks , 2010, IEEE Transactions on Mobile Computing.
[21] Fernando Lopez-Lezcano,et al. Center for Computer Research in Music and Acoustics (CCRMA) , 1994, ICMC.
[22] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[23] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[24] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[25] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[26] David Tse,et al. Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.
[27] Hao Chen,et al. Exploiting Opportunistic Scheduling in Cellular Data Networks , 2008, NDSS.
[28] Joseph Mitola,et al. The software radio architecture , 1995, IEEE Commun. Mag..
[29] Helmut Kurth,et al. Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.