Search Results

There are 9693 results for: content related to: Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach

  1. Avoidance of misbehaving nodes in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1096–1114, Tal Grinshpoun, Amnon Meisels and Eyal Felstaine

    Version of Record online : 22 JUL 2013, DOI: 10.1002/sec.841

  2. A cognitive accountability mechanism for penalizing misbehaving ECN-based TCP stacks

    International Journal of Network Management

    Volume 23, Issue 1, January/February 2013, Pages: 16–40, Steven Latré, Wim Van de Meerssche, Dirk Deschrijver, Dimitri Papadimitriou, Tom Dhaene and Filip De Turck

    Version of Record online : 1 APR 2012, DOI: 10.1002/nem.1806

  3. Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 232–244, Shuzhen Wang, Zonghua Zhang and Farid Naït-Abdesselam

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.976

  4. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  5. MISBEHAVIOR, EDUCATION, AND LABOR MARKET OUTCOMES

    Journal of the European Economic Association

    Volume 11, Issue 4, August 2013, Pages: 743–779, Carmit Segal

    Version of Record online : 24 JUL 2013, DOI: 10.1111/jeea.12025

  6. A security framework for wireless mesh networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 3, March 2011, Pages: 371–391, Parag S. Mogre, Kalman Graffi, Matthias Hollick and Ralf Steinmetz

    Version of Record online : 6 JUL 2010, DOI: 10.1002/wcm.984

  7. Characterizing the greedy behavior in wireless ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 284–298, Soufiene Djahel, Farid Naït-abdesselam and Damla Turgut

    Version of Record online : 3 AUG 2010, DOI: 10.1002/sec.210

  8. Distributed monitoring for misbehaviour detection in wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 388–400, Khelifa Benahmed, Madjid Merabti and Hafid Haffaf

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.624

  9. SDRP: a secure distributed revocation protocol for vehicular environments

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 279–289, Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi and Abderrahmane Lakas

    Version of Record online : 30 MAY 2012, DOI: 10.1002/sec.561

  10. Teacher misbehaviour: an analysis of disciplinary orders by the General Teaching Council for England

    British Educational Research Journal

    Volume 39, Issue 3, June 2013, Pages: 545–564, Damien Page

    Version of Record online : 24 JAN 2013, DOI: 10.1080/01411926.2012.674103

  11. You have free access to this content
    Detecting backoff misbehaviour in IEEE 802.11 EDCA

    European Transactions on Telecommunications

    Volume 22, Issue 1, January 2011, Pages: 31–34, S. Szott, M. Natkaniec and R. Canonico

    Version of Record online : 30 NOV 2010, DOI: 10.1002/ett.1459

  12. You have free access to this content
    A secure, service priority-based incentive scheme for delay tolerant networks

    Security and Communication Networks

    Volume 9, Issue 1, 10 January 2016, Pages: 5–18, Yongming Xie and Yan Zhang

    Version of Record online : 21 OCT 2015, DOI: 10.1002/sec.1372

  13. Three-partition flow cover inequalities for constant capacity fixed-charge network flow problems

    Networks

    Alper Atamtürk, Andrés Gómez and Simge Küçükyavuz

    Version of Record online : 21 MAR 2016, DOI: 10.1002/net.21677

  14. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 539–547, Farah Kandah, Yashaswi Singh, Weiyi Zhang and Chonggang Wang

    Version of Record online : 18 FEB 2013, DOI: 10.1002/sec.681

  15. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.597

  16. You have full text access to this OnlineOpen article
    Policy-based communications for 5G mobile with customer edge switching

    Security and Communication Networks

    Raimo Kantola, Jesus Llorente Santos and Nicklas Beijar

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1253

  17. PERSONAL AND SCHOOL CULTURAL FACTORS ASSOCIATED WITH THE PERCEPTIONS OF TEACHERS’ EFFICACY IN HANDLING STUDENT MISBEHAVIOR

    Psychology in the Schools

    Volume 51, Issue 2, February 2014, Pages: 164–180, Costas N. Tsouloupas, Russell L. Carson and Russell A. Matthews

    Version of Record online : 12 NOV 2013, DOI: 10.1002/pits.21739

  18. A survey on security and privacy issues in Wireless Mesh Networks

    Security and Communication Networks

    Aggeliki Sgora, Dimitrios D. Vergados and P. Chatzimisios

    Version of Record online : 12 SEP 2013, DOI: 10.1002/sec.846

  19. Legal Deterrence: the foundation of corporate governance – evidence from China

    Corporate Governance: An International Review

    Volume 15, Issue 5, September 2007, Pages: 741–767, Zhong Zhang

    Version of Record online : 25 SEP 2007, DOI: 10.1111/j.1467-8683.2007.00621.x

  20. Traceback model for identifying sources of distributed attacks in real time

    Security and Communication Networks

    Abdulghani Ali Ahmed, Ali Safa Sadiq and Mohamad Fadli Zolkipli

    Version of Record online : 31 MAR 2016, DOI: 10.1002/sec.1476