Mobile Ad-Hoc Networks Security
暂无分享,去创建一个
[1] Turgay Korkmaz,et al. EMLTrust: An enhanced Machine Learning based Reputation System for MANETs , 2012, Ad Hoc Networks.
[2] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[3] Niki Pissinou,et al. On quality of service routing in ad-hoc networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..
[4] G.V.S. Raju,et al. Defending against malicious nodes using an SVM based Reputation System , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[5] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[6] Turgay Korkmaz,et al. HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[7] Shouhuai Xu,et al. LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[8] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[9] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[10] Udo W. Pooch,et al. A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[11] Ramesh Patil,et al. Routing in Ad Hoc Networks , 2006 .
[12] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[13] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[14] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[15] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[16] Eugene H. Spafford,et al. Active Defense of a Computer System using Autonomous Agents , 1995 .
[17] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[18] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[19] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[20] M. Asaka,et al. A method of tracing intruders by use of mobile agents , 1999 .
[21] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[22] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).