Search Results

There are 8763 results for: content related to: A game inspired defense mechanism against distributed denial of service attacks

  1. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  2. QoS-driven resource allocation in green OFDMA wireless networks

    International Journal of Communication Systems

    Mahnaz Sinaie and Paeiz Azmi

    Article first published online : 27 FEB 2015, DOI: 10.1002/dac.2949

  3. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  4. Bayesian Analysis of Abandonment in Call Center Operations

    Applied Stochastic Models in Business and Industry

    Volume 30, Issue 2, March/April 2014, Pages: 141–156, Tevfik Aktekin and Refik Soyer

    Article first published online : 8 OCT 2012, DOI: 10.1002/asmb.1949

  5. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  6. Stabilization of state-constrained switched nonlinear systems in p-normal form

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 10, 10 July 2014, Pages: 1550–1562, Qingyu Su, Lijun Long and Jun Zhao

    Article first published online : 3 JAN 2013, DOI: 10.1002/rnc.2949

  7. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  8. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  9. Coloring networks for attacker identification and response

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 751–768, Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay

    Article first published online : 19 JUL 2014, DOI: 10.1002/sec.1022

  10. Universal Practical Tracking Control of a Planar Underactuated Vehicle

    Asian Journal of Control

    Xie Wen-Jing and Ma Bao-Li

    Article first published online : 27 AUG 2014, DOI: 10.1002/asjc.949

  11. Analysis and control stratagems of flash disk virus dynamic propagation model

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 226–235, Cong Jin and Xiao-Yan Wang

    Article first published online : 15 FEB 2011, DOI: 10.1002/sec.310

  12. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Jin Cao, Maode Ma and Hui Li

    Article first published online : 22 APR 2015, DOI: 10.1002/sec.1252

  13. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 666–677, Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.200

  14. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  15. An efficient splitting technique for two-layer shallow-water model

    Numerical Methods for Partial Differential Equations

    Christophe Berthon, Françoise Foucher and Tomás Morales

    Article first published online : 23 DEC 2014, DOI: 10.1002/num.21949

  16. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  17. Key splitting: making random key distribution schemes resistant against node capture

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 431–445, Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian Attari, Mohammad Reza Aref and Panos Papadimitratos

    Article first published online : 31 MAR 2014, DOI: 10.1002/sec.991

  18. A self-stabilized random access protocol against denial of service attack in wireless networks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1075–1087, Jahangir H. Sarker and Hussein T. Mouftah

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.248

  19. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 929–943, Arpan Roy, Dong Seong Kim and Kishor S. Trivedi

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.299

  20. Surveillance using non-stealthy sensors: A new intruder model

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1900–1911, Amitabha Bagchi, Rajshekar Kalayappan and Surabhi Sankhla

    Article first published online : 28 NOV 2013, DOI: 10.1002/sec.904