Sciweavers

1390 search results - page 110 / 278
» Virtual Mobile Nodes for Mobile Ad Hoc Networks
Sort
View
INFOCOM
2006
IEEE
15 years 7 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
ISCC
2005
IEEE
15 years 7 months ago
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario G...
WDAG
2007
Springer
84views Algorithms» more  WDAG 2007»
15 years 8 months ago
Mobility Versus the Cost of Geocasting in Mobile Ad-Hoc Networks
Roberto Baldoni, Kleoni Ioannidou, Alessia Milani
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 8 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi