Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
18
Page No.
3616 - 3623
References
Abrantes, F., J.T. Araujo and M. Ricardo, 2011. Explicit congestion control algorithms for time varying capacity media. IEEE. Trans. Mob. Comput., 10: 81-93.
CrossRef | Direct Link | Balan, E.V., M.K. Priyan, C. Gokulnath and G.U. Devi, 2015. Fuzzy based intrusion detection systems in MANET. Procedia Comput. Sci., 50: 109-114.
CrossRef | Direct Link | Dini, G. and A.L. Duca, 2012. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Netw., 10: 1167-1178.
Direct Link | Feng, L., L. Song, Q. Zhao and H. Wang, 2015. Modeling and stability analysis of worm propagation in wireless sensor network. Math. Prob. Eng., 2015: 1-9.
Direct Link | Ho, P.F., Y.H.S. Kam, M.C. Wee, Y.N. Chong and L.Y. Por, 2014. Preventing shoulder-surfing attack with the concept of concealing the password objects information. Sci. World J., 2014: 1-13.
Direct Link | Le, A. and A. Markopoulou, 2012. Cooperative defense against pollution attacks in network coding using spacemac. IEEE. J. Sel. Areas Commun., 30: 442-449.
CrossRef | Direct Link | Li, M., I. Koutsopoulos and R. Poovendran, 2010. Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE. Trans. Mob. Comput., 9: 1119-1133.
CrossRef | Direct Link | Li, Y., P. Hui, D. Jin, L. Su and L. Zeng, 2014. Optimal distributed malware defense in mobile networks with heterogeneous devices. IEEE. Trans. Mob. Comput., 13: 377-391.
CrossRef | Direct Link | Lu, L., M.J. Hussain, G. Luo and Z. Han, 2015. Pworm: Passive and real-time wormhole detection scheme for WSNs. Intl. J. Distrib. Sens. Netw., 2015: 1-17.
CrossRef | Direct Link | Lu, Z., W. Wang and C. Wang, 2015. Camouflage traffic: Minimizing message delay for smart grid applications under jamming. IEEE. Transac. Dependable Secure Comput., 12: 31-44.
CrossRef | Direct Link | Mehta, K., D. Liu and M. Wright, 2012. Protecting location privacy in sensor networks against a global eavesdropper. IEEE. Trans. Mob. Comput., 11: 320-336.
CrossRef | Direct Link | Palanisamy, B. and L. Liu, 2015. Attack-Resilient mix-zones over road networks: Architecture and algorithms. IEEE. Trans. Mob. Comput., 14: 495-508.
CrossRef | Direct Link | Porta, T.F.L., G. Maselli and C. Petrioli, 2011. Anticollision protocols for single-reader RFID systems: temporal analysis and optimization. IEEE. Trans. Mob. Comput., 10: 267-279.
CrossRef | Direct Link | Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comp. Commun., 34: 107-117.
CrossRef | Direct Link | Vasserman, E.Y. and N. Hopper, 2013. Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE. Trans. Mob. Comput., 12: 318-332.
CrossRef | Direct Link | Wang, L., Z. Li, Y. Chen, Z. Fu and X. Li, 2010. Thwarting zero-day polymorphic worms with network-level length-based signature generation. IEEE/ACM. Trans. Networking, 18: 53-66.
CrossRef | Direct Link | Xu, K., M. Shen, Y. Cui, M. Ye and Y. Zhong, 2014. A model approach to the estimation of peer-to-peer traffic matrices. IEEE. Trans. Parallel Distrib. Syst., 25: 1101-1111.
CrossRef | Direct Link | Yu, W., X. Wang, P. Calyam, D. Xuan and W. Zhao, 2011. Modeling and detection of camouflaging worm. IEEE. Trans. Dependable Secure Comput., 8: 377-390.
CrossRef | Direct Link |