Trust-Enabled Link Spoofing Detection in MANET
暂无分享,去创建一个
[1] Rafael Timóteo de Sousa Júnior,et al. Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.
[2] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[3] Michael S Lewis-Beck,et al. Sage university papers. Series Quantitative applications in the social sciences , 2008 .
[4] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[5] F. Sailhan,et al. Log-based Link Spoofing Detection in MANET , 2011 .
[6] Abdul Sattar,et al. A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks , 2010, 2010 Fourth International Conference on Network and System Security.
[7] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[8] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[9] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[10] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] F. Cuppens,et al. Property Based Intrusion Detection to Secure OLSR , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[13] Feng Lu,et al. Research on Identity-Based Cluster Access Control Model with Dynamic Trust Agent for Mobile Ad Hoc Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[14] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[16] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[17] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[18] Li Xu,et al. A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[19] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[20] Jean-Yves Le Boudec,et al. Analysis of a reputation system for Mobile Ad-Hoc Networks with liars , 2008, Perform. Evaluation.
[21] Muthucumaru Maheswaran,et al. Evolving and managing trust in grid computing systems , 2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373).
[22] M. Smithson. Confidence Intervals (7th ed) , 2003 .
[23] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[24] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[25] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[26] A. Antony Franklin,et al. On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks , 2008, 2008 16th IEEE International Conference on Networks.
[27] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.