KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks
暂无分享,去创建一个
[1] Bart Braem,et al. A questionnaire based examination of community networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[2] Leandro Navarro-Moldes,et al. Tight bounds for sketches in traffic validation , 2017, 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC).
[3] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[4] Sharon Goldberg,et al. Path-quality monitoring in the presence of adversaries , 2008, SIGMETRICS '08.
[5] Hsu-Chun Hsiao,et al. Securing data planes in software-defined networks , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).
[6] Leandro Navarro-Moldes,et al. Guifi.net, a Crowdsourced Network Infrastructure Held in Common , 2015, Comput. Networks.
[7] Filip Maly,et al. Troubleshooting Assistance Services in Community Wireless Networks , 2012, J. Comput. Networks Commun..
[8] Stefan Savage,et al. Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.
[9] Winston Khoon Guan Seah,et al. Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..
[10] Xin Zhang,et al. Secure and Scalable Fault Localization under Dynamic Traffic Patterns , 2012, 2012 IEEE Symposium on Security and Privacy.
[11] Stefan Savage,et al. Detecting Malicious Packet Losses , 2009, IEEE Transactions on Parallel and Distributed Systems.
[12] Adrian Perrig,et al. High-Speed Inter-Domain Fault Localization , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[13] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[14] Leandro Navarro-Moldes,et al. A technological overview of the guifi.net community network , 2015, Comput. Networks.
[15] Srikanth V. Krishnamurthy,et al. Forensic Analysis of Packet Losses in Wireless Networks , 2012, IEEE/ACM Transactions on Networking.
[16] Florin Rusu,et al. Statistical analysis of sketch estimators , 2007, SIGMOD '07.
[17] Francesco Chiti,et al. A broadband wireless communications system for emergency management , 2008, IEEE Wireless Communications.
[18] Renato Lo Cigno,et al. A week in the life of three large Wireless Community Networks , 2015, Ad Hoc Networks.
[19] Jennifer Rexford,et al. Stealth Probing: Efficient Data-Plane Security for IP Routing , 2006, USENIX Annual Technical Conference, General Track.
[20] Marwan Krunz,et al. Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing , 2012, WISEC '12.
[21] Mario Gerla,et al. Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.
[22] Katerina J. Argyraki,et al. Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.
[23] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[24] Stefan Savage,et al. Fatih: detecting and isolating malicious routers , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[25] Axel Franz Neumann,et al. Cooperation in open, decentralized, and heterogeneous computer networks , 2017 .
[26] David L. Johnson,et al. "Community Networks" in the African Context: Opportunities and Barriers , 2016, AfriCHI.
[27] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[28] Cristina Nita-Rotaru,et al. Practical Intrusion-Tolerant Networks , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).