Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Liu, Kejun
Deng, Jing
Varshney, Pramod K.
and
Balakrishnan, Kashyap
2007.
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs.
IEEE Transactions on Mobile Computing,
Vol. 6,
Issue. 5,
p.
536.
Badonnel, Remi
and
Burgess, Mark
2007.
Managing Virtualization of Networks and Services.
Vol. 4785,
Issue. ,
p.
62.
Manshaei, Mohammad Hossein
Félegyházi, Márk
Freudiger, Julien
Hubaux, Jean-Pierre
and
Marbach, Peter
2007.
Cognitive Wireless Networks.
p.
555.
Xinxin Fan
and
Gong, Guang
2008.
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks.
p.
958.
Caballero-Gil, P.
and
Hernández-Goya, C.
2008.
Cooperative Design, Visualization, and Engineering.
Vol. 5220,
Issue. ,
p.
286.
Fanaei, Mohammad
Fanian, Ali
and
Berenjkoub, Mehdi
2008.
Advances in Computer Science and Engineering.
Vol. 6,
Issue. ,
p.
994.
Fanaei, Mohammad
Berenjkoub, Mehdi
and
Fanian, Ali
2008.
Resistant TIK-Based endairA Against the Tunneling Attack.
p.
1461.
Zhang, Nan
Yu, Wei
Fu, Xinwen
and
Das, Sajal K.
2008.
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
p.
501.
Katz, Jonathan
2008.
Theory of Cryptography.
Vol. 4948,
Issue. ,
p.
251.
Khan, Rasib Hassan
Imtiaz-ud-Din, K. M.
Faruq, Abdullah Ali
Abu Raihan Mostofa Kamal
and
Mottalib, Abdul
2008.
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV).
p.
588.
Faigl, Zoltán
Brunstrom, Anna
and
Lindskog, Stefan
2008.
Adaptation and Cross Layer Design in Wireless Networks.
p.
451.
Yufang Xi
and
Yeh, Edmund M.
2008.
Equilibria and price of anarchy in parallel relay networks with node pricing.
p.
944.
Xi, Y.
and
Yeh, E. M.
2008.
Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks.
p.
1463.
Higgins, Fiona
Tomlinson, Allan
and
Martin, Keith M.
2009.
Survey on Security Challenges for Swarm Robotics.
p.
307.
Gui, Jinsong
2009.
A Routing Misbehavior Detection and Mitigating Scheme Based on Reputation in Hybrid Wireless Mesh Networks.
p.
545.
Hernández-Goya, C.
Caballero-Gil, P.
Molina-Gil, J.
and
Caballero-Gil, C.
2009.
Computer Aided Systems Theory - EUROCAST 2009.
Vol. 5717,
Issue. ,
p.
429.
Raza, Shahid
Slabbert, Adriaan
Voigt, Thiemo
and
Landernas, Krister
2009.
Security considerations for the WirelessHART protocol.
p.
1.
Mari, Federico
Melatti, Igor
Salvo, Ivano
Tronci, Enrico
Alvisi, Lorenzo
Clement, Allen
and
Li, Harry
2009.
Stabilization, Safety, and Security of Distributed Systems.
Vol. 5873,
Issue. ,
p.
531.
Wingfield, Robert A.
Nguyen, Quang A.
and
Umur, Nedim
2009.
RAWR: A protocol for secure wireless ad hoc routing using trustworthiness and the wisdom of crowds.
p.
235.
Garcin, Florent
Manshaei, Mohammad Hossein
and
Hubaux, Jean-Pierre
2009.
Cooperation in underwater sensor networks.
p.
540.