On-demand security and qos optimization in mobile ad hoc networks
暂无分享,去创建一个
[1] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[2] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[3] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[4] Kang G. Shin,et al. A distributed route-selection scheme for establishing real-time channels , 1995, HPN.
[5] Ariel Orda,et al. QoS based routing in networks with inaccurate information: theory and algorithms , 1997, Proceedings of INFOCOM '97.
[6] Raphael Rom,et al. Multi-path routing combined with resource reservation , 1997, Proceedings of INFOCOM '97.
[7] Yu-Chee Tseng,et al. Secure bootstrapping and routing in an IPv6-based ad hoc network , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[8] H. T. Mouftah,et al. QoS routing through alternate paths in wireless ad hoc networks , 2004, Int. J. Commun. Syst..
[9] Kurt Jensen,et al. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .
[10] Klara Nahrstedt,et al. Distributed quality-of-service routing in ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[11] Carl E. Landwehr,et al. Computer security , 2001, International Journal of Information Security.
[12] Klara Nahrstedt,et al. An overview of quality of service routing for next-generation high-speed networks: problems and solutions , 1998, IEEE Netw..
[13] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..
[14] H. Zheng,et al. Policy-based security management for ad hoc wireless systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[15] William A. Arbaugh,et al. Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[16] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[17] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[18] Jain-Shing Liu,et al. QoS routing in ad hoc wireless networks , 1999, IEEE J. Sel. Areas Commun..
[19] Benjamin C. Kuo,et al. AUTOMATIC CONTROL SYSTEMS , 1962, Universum:Technical sciences.
[20] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[21] Klara Nahrstedt,et al. On finding multi-constrained paths , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[22] Ariel Orda,et al. QoS routing in networks with uncertain parameters , 1998, IEEE/ACM Trans. Netw..
[23] Udo W. Pooch,et al. Cooperative security-enforcement routing in mobile ad hoc networks , 2002, 4th International Workshop on Mobile and Wireless Communications Network.
[24] Kurt Jensen,et al. Coloured Petri Nets , 1997, Monographs in Theoretical Computer Science An EATCS Series.
[25] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[26] J. Redi,et al. A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.
[27] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[28] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[29] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[30] John Moy,et al. OSPF Version 2 , 1998, RFC.
[31] Chenxi Zhu,et al. Medium Access Control and Quality-of-Service Routing for Mobile Ad Hoc Networks , 2001 .
[32] Douglas S. Reeves,et al. A distributed algorithm for delay-constrained unicast routing , 1997, Proceedings of INFOCOM '97.
[33] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[34] Li-Hsing Yen,et al. Topology-aided cross-layer fast handoff designs for IEEE 802.11/mobile IP environments , 2005, IEEE Commun. Mag..
[35] Chenxi Zhu,et al. QoS routing for mobile ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[36] Klara Nahrstedt,et al. Predictive location-based QoS routing in mobile ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[37] Jim Alves-Foss,et al. Assessing computer security vulnerability , 1995, OPSR.
[38] H. T. Mouftah,et al. QoS routing for wireless ad hoc networks: problems, algorithms, and protocols , 2005, IEEE Communications Magazine.
[39] Michael Howard,et al. Measuring Relative Attack Surfaces , 2005 .
[40] Jennifer C. Hou. Routing virtual circuits with timing requirements in virtual path based ATM networks , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.