Impact of optimal MAC layer attacks on the network layer
暂无分享,去创建一个
[1] Gerrit Beldman,et al. Lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[4] Madhav V. Marathe,et al. Analyzing interaction between network protocols, topology and traffic in wireless radio networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[5] Rodney W. Johnson,et al. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy , 1980, IEEE Trans. Inf. Theory.
[6] Byoung-Seon Choi,et al. Conditional limit theorems under Markov conditioning , 1987, IEEE Trans. Inf. Theory.
[7] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[8] John S. Baras,et al. An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.
[9] P. Protter. Stochastic integration and differential equations , 1990 .
[10] M. Motani,et al. Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.
[11] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[12] Panganamala Ramana Kumar,et al. A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.
[13] R. Johnson,et al. Properties of cross-entropy minimization , 1981, IEEE Trans. Inf. Theory.
[14] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.