Cyber Maneuver Against External Adversaries and Compromised Nodes
暂无分享,去创建一个
[1] Don Torrieri. Principles of Spread-Spectrum Communication Systems, 2nd Edition , 2011 .
[2] K. Bakhru,et al. Direction Finding for Spread-Spectrum Systems with Adaptive Arrays , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[3] Don Torrieri,et al. Principles of Spread-Spectrum Communication Systems , 2004 .
[4] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Srikanth V. Krishnamurthy,et al. Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[6] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[7] Srdjan Capkun,et al. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.
[8] Michele Nogueira Lima,et al. Survivable key management on WANETs , 2011, IEEE Wireless Communications.
[9] Loukas Lazos,et al. Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.
[10] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[11] Ranjit Singh,et al. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.
[12] Klara Nahrstedt,et al. A novel approach to identify insider-based jamming attacks in multi-channel wireless networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[13] Sencun Zhu,et al. Compromise-Resilient Anti-jamming for Wireless Sensor Networks , 2010, ICICS.
[14] Murat Çakiroglu,et al. Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.
[15] Yih-Chun Hu,et al. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.
[16] Don J. Torrieri,et al. Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..
[17] Mudhakar Srivatsa,et al. The fable of the bees: incentivizing robust revocation decision making in ad hoc networks , 2009, CCS.
[18] Josef Pieprzyk,et al. Broadcast anti-jamming systems , 2001, Comput. Networks.
[19] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[20] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[21] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[22] Suzanne Hassell,et al. Using cyber maneuver to improve network resiliency , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[23] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.