1 |
P. Michiardi, and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks," in Proc. of European Wireless 2002 Conference, 2002.
|
2 |
Y. Zhang, and W. Lee. "Intrusion detection in wireless ad-hoc networks," in Proc. of 6th ACM Annual International Conference on Mobile Computing and Networking, pp.275-283, Aug.2000.
|
3 |
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of 6th ACM Annual International Conference on Mobile Computing and Networking, pp.255-265, Aug.2000.
|
4 |
S. Buchegger, and J-Y. L. Boudec, "Nodes Bearing Grudges: towards routing security, fairness and robustness in mobile ad hoc networks," in Proc. of 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, Jan.2002.
|
5 |
S. Buchegger, and J-Y. L. Boudec, "Performance analysis of the CONFIDANT Protocol," in Proc. of the 3rd ACM International Symposium on Mobile ad hoc networking & computing, pp.226-236, 2002.
|
6 |
K. Chang, and J-L Chen, "A Survey of Trust Management in WSNs, Internet of Things and Future Internet," KSII Transactions on Internet and Information System, vol.6, no.1, pp.5-23, Jan.2012
|
7 |
P. Kyul, H. Nishiyama, N.Ansari, and N. Kato, "certificate revocation to cope with false accusations in mobile ad hoc networks," in Proc. of 71st IEEE Vehicular Technology Conference, pp.1-5, May,2010.
|
8 |
A. Kathirvel, and R. Srinivasan, "Self_USS:A self umpiring system for security in mobile ad hoc network," International Journal of Engineering and Technology, vol.2, no.2, pp.196-203, Apr.2010.
|
9 |
C. Tseng, T. Song, P. Balasubramanyam, A. Ko, and K. Levitt, "A specification-based Intrusion Detection Model for OLSR", LNCS, vol.3858, pp.330-350, 2006.
|
10 |
A. Mitrokotsa, R. Mavropodi, and C. Douligeris, "intrusion detection of packet dropping attacks in mobile ad hoc networks," in Proc. of International Conference on Intelligent Systems and Computing: Theory And Applications, pp.111-118, Jul.2006.
|
11 |
O. Gonzalez, G. Ansa, M. Howarth, and G. Pavlou, "Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks," Journal of Internet Engineering, pp.181-192, Jun.2008.
|
12 |
J. Sen, and K. Goswami, "An algorithm for detection of selfish nodes in wireless mesh networks," in Proc. of the International Symposium on Intelligent Information Systems and Applications, pp.571-576, Oct.2009.
|
13 |
T. Anantvalee, and J. Wu, "A survey on intrusion detection in mobile ad hoc networks," Book Series Wireless Network Security, Springer, pp.170-196, 2007.
|
14 |
V. Gokhole, S.K. Ghosh, and A. Gupta, "classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks," Taylor and Francis Group, eBook, pp.195-225, 2011.
|
15 |
C. K. Toh, E.C. Lee, and N.A. Ramos, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks," NORHTROP GRUMMAN Technology Review Journal, pp.103-116, Spring/Summer 2004.
|
16 |
J. Brand, and G. Hartwig, "Management of tactical ad hoc networks with C2 data models," in Proc. of MILCOM 2001, pp.915-922, Aug.2001.
|
17 |
M. Popa, C. Moica, A.S. Popa, D. Mnerie, "Hierarchical Ad Hoc Networks", in Proc. of IEEE EUROCON 2007, The International Conference on "Computer as a Tool", pp.2509-2516, 2007.
|
18 |
S-J. Yoon, S-H. Lee, Y-B. Ko, "Reliable dual-path geocasting for tactical ad hoc networks," in Proc. of MILCOM 2009, pp.1-7, Oct.2009.
|
19 |
H. Wang, Y. Wang, J. Han, "A security architecture for tactical mobile ad hoc networks," in Proc. Of IEEE 2nd International Workshop on Knowledge Discovery and Data Mining, pp.312-315, Jan.2009.
|
20 |
F.R. Yu, H. Tang, P.C. Mason, Wang Fei, "A hierarchical identity based key management scheme in tactical mobile ad hoc networks," IEEE Transactions on Network and Service Management, vol.7, no.4, pp.258-267, Dec.2010.
DOI
|
21 |
S-W. Lee, J. Y. Choi, K. W. Lim, Y-B. Ko, and B-H. Roh, "a reliable and hybrid multi-path routing protocol for multi-interface tactical ad hoc networks," in Proc. of MILCOM 2010, pp.2237-2242, Nov.2010.
|
22 |
C. E. Perkins, and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proc. of 2nd IEEE Workshop on Mobile Computer Systems and Applications, pp.90-100, Feb., 1999.
|