Automated testing for cyber threats to ad-hoc wireless networks
暂无分享,去创建一个
[1] Jörg Denzinger,et al. Testing of precision agricultural networks for adversary-induced problems , 2013, GECCO '13.
[2] Jon Postel,et al. Internet Protocol , 1981, RFC.
[3] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[4] Joan García-Haro,et al. Testing viability of relay policies for reactive CCA applications in VANETs , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[5] Jeffrey E. Boyd,et al. Automated Testing of Physical Security: Red Teaming Through Machine Learning , 2015, Comput. Intell..
[6] Jörg Denzinger,et al. Behavior Learning-Based Testing of Starcraft Competition Entries , 2011, AIIDE.
[7] Subir Biswas,et al. Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety , 2006, IEEE Communications Magazine.
[8] Klaus Wehrle,et al. KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment , 2010, IPSN '10.
[9] Matthias Woehrle,et al. Search-Based Stress Testing of Wireless Network Protocol Stacks , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[10] John A. Clark,et al. Protocols are programs too: the meta-heuristic search for security protocols , 2001, Inf. Softw. Technol..
[11] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[12] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[13] Jörg Denzinger,et al. Testing the Limits of Emergent Behavior in MAS Using Learning of Cooperative Behavior , 2006, ECAI.
[14] Thomas Bäck,et al. Evolutionary algorithms in theory and practice - evolution strategies, evolutionary programming, genetic algorithms , 1996 .
[15] Joan Garcia-Haro,et al. Performance Evaluation of a CCA Application for VANETs Using IEEE 802.11p , 2010, 2010 IEEE International Conference on Communications Workshops.