Search Results

There are 12093 results for: content related to: CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks

  1. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  2. A survey on security and privacy issues in Wireless Mesh Networks

    Security and Communication Networks

    Aggeliki Sgora, Dimitrios D. Vergados and P. Chatzimisios

    Version of Record online : 12 SEP 2013, DOI: 10.1002/sec.846

  3. DSA-Mesh: a distributed security architecture for wireless mesh networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 242–256, Fabio Martignon, Stefano Paris and Antonio Capone

    Version of Record online : 13 JAN 2010, DOI: 10.1002/sec.181

  4. IP address assignment in wireless mesh networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 3, March 2011, Pages: 321–337, Alexander Zimmermann, Arnd Hannemann and Benjamin Schleinzer

    Version of Record online : 20 JUL 2010, DOI: 10.1002/wcm.982

  5. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Version of Record online : 14 FEB 2013, DOI: 10.1002/sec.725

  6. Avoidance of misbehaving nodes in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1096–1114, Tal Grinshpoun, Amnon Meisels and Eyal Felstaine

    Version of Record online : 22 JUL 2013, DOI: 10.1002/sec.841

  7. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  8. A novel path-based approach for single-packet IP traceback

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 309–321, Ning Lu, Yulong Wang, Sen Su and Fangchun Yang

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.741

  9. Replication schemes for peer-to-peer content in wireless mesh networks with infrastructure support

    Wireless Communications and Mobile Computing

    Volume 15, Issue 4, March 2015, Pages: 699–715, Amr Alasaad, Sathish Gopalakrishnan and Victor C.M. Leung

    Version of Record online : 25 APR 2013, DOI: 10.1002/wcm.2376

  10. A taxonomy and evaluation for developing 802.11-based wireless mesh network testbeds

    International Journal of Communication Systems

    Volume 25, Issue 8, August 2012, Pages: 963–990, Suleyman Uludag, Tom Imboden and Kemal Akkaya

    Version of Record online : 20 JUL 2011, DOI: 10.1002/dac.1299

  11. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  12. Coloring networks for attacker identification and response

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 751–768, Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay

    Version of Record online : 19 JUL 2014, DOI: 10.1002/sec.1022

  13. Secured and fast handoff in wireless mesh networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 644–657, Faouzi Zarai, Ikbel Daly, Mohammad S. Obaidat, Fellow of IEEE, Fellow of SCS and Lotfi Kamoun

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.596

  14. An efficient communication relay placement algorithm for content-centric wireless mesh networks

    International Journal of Communication Systems

    Volume 28, Issue 2, 25 January 2015, Pages: 262–280, Jin Wang, Kejie Lu, Shukui Zhang, Jianxi Fan, Yanqin Zhu and Baolei Cheng

    Version of Record online : 12 SEP 2013, DOI: 10.1002/dac.2666

  15. Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks

    Security and Communication Networks

    Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams and Jaime Lloret

    Version of Record online : 4 FEB 2015, DOI: 10.1002/sec.1204

  16. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  17. Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2037–2059, Muhammad Aamir and Syed Mustafa Ali Zaidi

    Version of Record online : 29 OCT 2014, DOI: 10.1002/sec.1149

  18. An efficient self-diagnosis protocol for hierarchical wireless mesh networks

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 14, 25 September 2013, Pages: 2036–2051, Li Xu, Lei Ji and Shu Ming Zhou

    Version of Record online : 20 JUN 2012, DOI: 10.1002/cpe.2873

  19. A survey of cross-layer protocols for IEEE 802.11 wireless multi-hop mesh networks

    International Journal of Communication Systems

    Sajid M. Sheikh, Riaan Wolhuter and Herman A. Engelbrecht

    Version of Record online : 7 APR 2016, DOI: 10.1002/dac.3129

  20. A scalable NAT-based solution to Internet access denial by higher-tier ISPs

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 194–209, Marwan Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli and Farag Azzedin

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.557