Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT
暂无分享,去创建一个
Arun Kumar Sangaiah | Rutvij H. Jhaveri | Narendra M. Patel | Yubin Zhong | A. K. Sangaiah | R. Jhaveri | Yu-bin Zhong | Narendra M. Patel
[1] Carlos Miguel Tavares Calafate,et al. TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs , 2017, Veh. Commun..
[2] Nader Mohamed,et al. TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[3] Kim-Kwang Raymond Choo,et al. Hypergraph partitioning for social networks based on information entropy modularity , 2017, J. Netw. Comput. Appl..
[4] J. Martin Leo Manickam,et al. Design and Development of CTSR with Direct & Indirect Observations of MANET Applications , 2017, Mob. Networks Appl..
[5] Jie Wu,et al. Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.
[6] Weiwei Lin,et al. An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.
[7] Qin Liu,et al. Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.
[8] Jin Li,et al. Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.
[9] Dongqing Xie,et al. Social influence modeling using information theory in mobile social networks , 2017, Inf. Sci..
[10] Olayinka Adigun,et al. Towards a scalable routing approach for Mobile Ad-hoc Networks , 2015, 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD).
[11] Bo Wang,et al. A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..
[12] Jie Wu,et al. Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..
[13] Sandeep A. Thorat,et al. Uncertainty analysis framework for trust based routing in MANET , 2017, Peer Peer Netw. Appl..
[14] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[15] N. Kannan,et al. Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET , 2017, Wirel. Networks.
[16] Jie Wu,et al. Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[17] Nadeem Javaid,et al. MATF: a multi-attribute trust framework for MANETs , 2016, EURASIP J. Wirel. Commun. Netw..
[18] Jin Li,et al. Flexible neural trees based early stage identification for IP traffic , 2017, Soft Comput..
[19] Jie Wu,et al. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[20] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[21] Rutvij H. Jhaveri,et al. Attack‐pattern discovery based enhanced trust model for secure routing in mobile ad‐hoc networks , 2017, Int. J. Commun. Syst..
[22] Abdelfettah Belghith,et al. DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks , 2017, KSII Trans. Internet Inf. Syst..
[23] Rutvij H. Jhaveri,et al. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.
[24] Guopu Zhu,et al. Transportation Spherical Watermarking , 2018, IEEE Transactions on Image Processing.
[25] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[26] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[27] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.
[28] Rutvij H. Jhaveri,et al. Mobile Ad-hoc Networking with AODV: A Review , 2015, Int. J. Next Gener. Comput..
[29] W. Marsden. I and J , 2012 .
[30] Xiaohua Tian,et al. AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.