Transmission Time-Based Mechanism to Detect Wormhole Attacks
暂无分享,去创建一个
[1] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[2] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[3] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[4] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[5] Francesco Tiezzi,et al. A WSDL-Based Type System for WS-BPEL , 2006, COORDINATION.
[6] Hairong Yu,et al. A service-oriented architecture for financial business processes , 2007, Inf. Syst. E Bus. Manag..
[7] Szilveszter Juhos,et al. Post Docking Filtering Using Cartesian Genetic Programming , 2003, Artificial Evolution.
[8] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[9] David S. Goodsell,et al. Automated docking using a Lamarckian genetic algorithm and an empirical binding free energy function , 1998 .
[10] Hai Jin. ChinaGrid: Making Grid Computing a Reality , 2004, ICADL.
[11] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .
[12] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[13] Jerry Zeyu Gao,et al. Measuring Component-Based Systems Using a Systematic Approach and Environment , 2006, 2006 Second IEEE International Symposium on Service-Oriented System Engineering (SOSE'06).
[14] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[15] A. Sali,et al. Comparative protein structure modeling of genes and genomes. , 2000, Annual review of biophysics and biomolecular structure.
[16] Irene T Weber,et al. Structure based drug design for HIV protease: from molecular modeling to cheminformatics. , 2007, Current topics in medicinal chemistry.
[17] King-Shan Lui,et al. DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[18] W. Graham Richards,et al. Virtual screening using grid computing: the screensaver project , 2002, Nature Reviews Drug Discovery.
[19] D. Diller,et al. Kinases, homology models, and high throughput docking. , 2003, Journal of medicinal chemistry.
[20] Lijun Qian,et al. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[21] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[22] Yih-Chun Hu,et al. Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.
[23] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[24] Johannes H. Voigt,et al. Comparison of the NCI Open Database with Seven Large Chemical Structural Databases , 2001, J. Chem. Inf. Comput. Sci..
[25] Liang Chen,et al. Grid Service Orchestration Using the Business Process Execution Language (BPEL) , 2005, Journal of Grid Computing.
[26] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[27] Bharat K. Bhargava,et al. Visualization of wormholes in sensor networks , 2004, WiSe '04.
[28] Heejo Lee,et al. TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[29] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[30] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.