Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 18
Page No. 3616 - 3623

An Enhanced Hidden Markov Dynamic Bayesian model for Resisting Camouflaging Worm attack study

Authors : R. Saranya and S. Senthamarai Kannan

References

Abrantes, F., J.T. Araujo and M. Ricardo, 2011. Explicit congestion control algorithms for time varying capacity media. IEEE. Trans. Mob. Comput., 10: 81-93.
CrossRef  |  Direct Link  |  

Balan, E.V., M.K. Priyan, C. Gokulnath and G.U. Devi, 2015. Fuzzy based intrusion detection systems in MANET. Procedia Comput. Sci., 50: 109-114.
CrossRef  |  Direct Link  |  

Dini, G. and A.L. Duca, 2012. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Netw., 10: 1167-1178.
Direct Link  |  

Feng, L., L. Song, Q. Zhao and H. Wang, 2015. Modeling and stability analysis of worm propagation in wireless sensor network. Math. Prob. Eng., 2015: 1-9.
Direct Link  |  

Ho, P.F., Y.H.S. Kam, M.C. Wee, Y.N. Chong and L.Y. Por, 2014. Preventing shoulder-surfing attack with the concept of concealing the password objects information. Sci. World J., 2014: 1-13.
Direct Link  |  

Le, A. and A. Markopoulou, 2012. Cooperative defense against pollution attacks in network coding using spacemac. IEEE. J. Sel. Areas Commun., 30: 442-449.
CrossRef  |  Direct Link  |  

Li, M., I. Koutsopoulos and R. Poovendran, 2010. Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE. Trans. Mob. Comput., 9: 1119-1133.
CrossRef  |  Direct Link  |  

Li, Y., P. Hui, D. Jin, L. Su and L. Zeng, 2014. Optimal distributed malware defense in mobile networks with heterogeneous devices. IEEE. Trans. Mob. Comput., 13: 377-391.
CrossRef  |  Direct Link  |  

Lu, L., M.J. Hussain, G. Luo and Z. Han, 2015. Pworm: Passive and real-time wormhole detection scheme for WSNs. Intl. J. Distrib. Sens. Netw., 2015: 1-17.
CrossRef  |  Direct Link  |  

Lu, Z., W. Wang and C. Wang, 2015. Camouflage traffic: Minimizing message delay for smart grid applications under jamming. IEEE. Transac. Dependable Secure Comput., 12: 31-44.
CrossRef  |  Direct Link  |  

Mehta, K., D. Liu and M. Wright, 2012. Protecting location privacy in sensor networks against a global eavesdropper. IEEE. Trans. Mob. Comput., 11: 320-336.
CrossRef  |  Direct Link  |  

Palanisamy, B. and L. Liu, 2015. Attack-Resilient mix-zones over road networks: Architecture and algorithms. IEEE. Trans. Mob. Comput., 14: 495-508.
CrossRef  |  Direct Link  |  

Porta, T.F.L., G. Maselli and C. Petrioli, 2011. Anticollision protocols for single-reader RFID systems: temporal analysis and optimization. IEEE. Trans. Mob. Comput., 10: 267-279.
CrossRef  |  Direct Link  |  

Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comp. Commun., 34: 107-117.
CrossRef  |  Direct Link  |  

Vasserman, E.Y. and N. Hopper, 2013. Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE. Trans. Mob. Comput., 12: 318-332.
CrossRef  |  Direct Link  |  

Wang, L., Z. Li, Y. Chen, Z. Fu and X. Li, 2010. Thwarting zero-day polymorphic worms with network-level length-based signature generation. IEEE/ACM. Trans. Networking, 18: 53-66.
CrossRef  |  Direct Link  |  

Xu, K., M. Shen, Y. Cui, M. Ye and Y. Zhong, 2014. A model approach to the estimation of peer-to-peer traffic matrices. IEEE. Trans. Parallel Distrib. Syst., 25: 1101-1111.
CrossRef  |  Direct Link  |  

Yu, W., X. Wang, P. Calyam, D. Xuan and W. Zhao, 2011. Modeling and detection of camouflaging worm. IEEE. Trans. Dependable Secure Comput., 8: 377-390.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved