nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Algorithms for a distributed IDS in MANETs
|
Mafra, P.M. |
|
2014 |
80 |
3 |
p. 554-570 17 p. |
artikel |
2 |
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
|
Rehman, Saeed Ur |
|
2014 |
80 |
3 |
p. 591-601 11 p. |
artikel |
3 |
A new definition of homomorphic signature for identity management in mobile cloud computing
|
Wang, Zhiwei |
|
2014 |
80 |
3 |
p. 546-553 8 p. |
artikel |
4 |
Betweenness estimation in OLSR-based multi-hop networks for distributed filtering
|
Maccari, Leonardo |
|
2014 |
80 |
3 |
p. 670-685 16 p. |
artikel |
5 |
Broadcast encryption based non-interactive key distribution in MANETs
|
Yang, Yang |
|
2014 |
80 |
3 |
p. 533-545 13 p. |
artikel |
6 |
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
|
Gil Pérez, Manuel |
|
2014 |
80 |
3 |
p. 571-590 20 p. |
artikel |
7 |
Clone wars: Distributed detection of clone attacks in mobile WSNs
|
Conti, M. |
|
2014 |
80 |
3 |
p. 654-669 16 p. |
artikel |
8 |
Contents
|
|
|
2014 |
80 |
3 |
p. OBC- 1 p. |
artikel |
9 |
Defending against wireless network intrusion
|
Pathan, Al-Sakib Khan |
|
2014 |
80 |
3 |
p. 499-501 3 p. |
artikel |
10 |
Detection and mitigation of sinkhole attacks in wireless sensor networks
|
Shafiei, H. |
|
2014 |
80 |
3 |
p. 644-653 10 p. |
artikel |
11 |
Editorial Board
|
|
|
2014 |
80 |
3 |
p. IFC- 1 p. |
artikel |
12 |
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
|
Wahid, Alif |
|
2014 |
80 |
3 |
p. 502-519 18 p. |
artikel |
13 |
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks
|
Giannetsos, Thanassis |
|
2014 |
80 |
3 |
p. 618-643 26 p. |
artikel |
14 |
Management and applications of trust in Wireless Sensor Networks: A survey
|
Han, Guangjie |
|
2014 |
80 |
3 |
p. 602-617 16 p. |
artikel |
15 |
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
|
Zhao, Yifan |
|
2014 |
80 |
3 |
p. 520-532 13 p. |
artikel |