1 |
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
DOI
|
2 |
Xiong Li, Maged Hamada Ibrahim, SaruKumari, Arun Kumar Sangaiah, Vidushi Gupta and Kim-Kwang Raymond Choo,"Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks," Computer Networks, 2017.
|
3 |
Elhadi M. Shakshuki, Nan Kang, and Tarek R. Sheltami, "EAACK-A Secure Intrusion-Detection, System for MANETs," IEEE Transactions on Industrial, VOL. 60, NO. 3, March 2013.
|
4 |
Xiong Li, JiangweiNiu, SaruKumari, Fan Wu, Arun Kumar Sangaiah and Kim-Kwang Raymond Choo, "A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments," Journal of Network and Computer Applications, 2017.
|
5 |
Juntao Gao, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori, "End-to-End Delay Modeling for Mobile Ad Hoc Networks: A Quasi-Birth-and-Death Approach," Ad Hoc & Sensor Wireless Networks, 2015.
|
6 |
Y.Zhang, W.Liu, W.Lio and Y.Fang, "Securing Mobile Ad Hoc Networks with Certificateless public keys," IEEE Transactions on Dependable and Secure Computing, Vol.3, No.4, pp.386-399, Oct.- December, 2006.
DOI
|
7 |
Minho Jo, "A Survey: Energy Exhausting Attacks in MAC Protocols in WBANs," Telecommunication Systems, Vol.58, No.2, pp. 153-164, February 2015.
DOI
|
8 |
KekeGai, Meikang Qiu, , Zhong Ming, Hui Zhao, Longfei Qiu, "Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks," IEEE Transactions on Smart Grid, Vol.8, Issue5, pp. 2431 - 2439, February 2017.
DOI
|
9 |
T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks," Wireless/Mobile Security, New York: Springer-Verlag, 2008.
|
10 |
KekeGai, Longfei Qiu, Min Chen, Hui Zhao, Meikang Qiu, "SA-EAST:Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing," ACM Trans. Embedded Comp. Syst., 2017.
|
11 |
T. G. Dietterich, R. H. Lathrop, and T. Lozano-Perez. "Solving the multiple-instance problem with axis-parallel rectangles," Artificial Intelligence, 89(1-2):31-71, 1997.
DOI
|
12 |
N. Aschenbruck, E. Gerhards-Padilla, and P. Martini, "A survey on mobility models for performance analysis in tactical mobile networks," Journal of Telecommunications and Information Technology, vol. 2, pp. 54-61, 2008.
|
13 |
D. Johnson, Y. Hu, and D. Maltz, "Rfc 4728: The dynamic source routing protocol for mobile ad hoc networks for ipv4," 2007.
|
14 |
KekeGai, Meikang Qiu, Lixin Tao and Yongxin Zhu, "Intrusion detection techniques for mobile cloud computing in heterogeneous 5G," Security and communication networks, February 2015.
|
15 |
Tran Hoang Hai, Eui-Nam Huhand and Minho Jo,"Lightweight intrusion detection framework for wireless sensor networks," Wireless Communications and Mobile Computing, Vol.10, No.4, pp.559-572, April 2010.
DOI
|
16 |
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Mobile Computer Networks., Boston, MA, pp. 255-265, 2000.
|