On modeling of adversary behavior and defense for survivability of military MANET applications
暂无分享,去创建一个
[1] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[2] Mihaela van der Schaar,et al. Intervention with Private Information, Imperfect Monitoring and Costly Communication , 2013, IEEE Transactions on Communications.
[3] Jin-Hee Cho,et al. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.
[4] Ing-Ray Chen,et al. Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..
[5] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[6] Ananthram Swami,et al. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..
[7] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[8] Sheng-Tzong Cheng,et al. Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.
[9] Jia Guo,et al. Trust management in mobile ad hoc networks for bias minimization and application performance maximization , 2014, Ad Hoc Networks.
[10] Mrs. A. Sangeetha,et al. REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING FOR INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS , 2014 .
[11] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[13] Ing-Ray Chen,et al. Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.
[14] Ing-Ray Chen,et al. Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..
[15] Ing-Ray Chen,et al. On Survivability of Mobile Cyber Physical Systems with Intrusion Detection , 2012, Wireless Personal Communications.
[16] Jin-Hee Cho,et al. Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks , 2011, Perform. Evaluation.
[17] Farokh B. Bastani,et al. Effect of artificial-intelligence planning-procedures on system reliability , 1991 .
[18] Ji Wang,et al. Trust-based data fusion mechanism design in cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.
[19] Ing-Ray Chen,et al. Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks , 2015, TOSN.
[20] Ing-Ray Chen,et al. Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks , 2011, IEEE Transactions on Mobile Computing.
[21] Ing-Ray Chen,et al. Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..
[22] Ing-Ray Chen,et al. Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..
[23] Farokh B. Bastani,et al. On the Reliability of AI Planning Software in Real-Time Applications , 1995, IEEE Trans. Knowl. Data Eng..
[24] Ing-Ray Chen,et al. Analysis of Replicated Data with Repair Dependency , 1996, Comput. J..
[25] Farokh B. Bastani,et al. Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).
[26] Ing-Ray Chen,et al. Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers , 1998, Perform. Evaluation.
[27] Guofei Jiang,et al. Modeling and analytics for cyber-physical systems in the age of big data , 2014, PERV.
[28] Ing-Ray Chen,et al. Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.
[29] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[30] Ing-Ray Chen,et al. Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks , 2001, Mob. Networks Appl..
[31] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[32] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[33] Ing-Ray Chen,et al. Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..
[34] Ing-Ray Chen,et al. Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.
[35] Ing-Ray Chen,et al. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.