Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
110 | Chen-Nee Chuah, Lakshminarayanan Subramanian, Randy H. Katz |
DCAP: detecting misbehaving flows via collaborative aggregate policing. |
Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
flow-level accounting, misbehaving flow detection, traffic policing |
73 | Tarek R. Sheltami, Anas Al-Roubaiey, Elhadi M. Shakshuki, Ashraf S. Hasan Mahmoud |
Video transmission enhancement in presence of misbehaving nodes in MANETs. |
Multim. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Watchdog, TWOACK, Misbehaving nodes, H264, MANET, IDS, DSR, MPEG4 |
73 | Xuejun Zhuo, Jianguo Hao, Duo Liu, Yiqi Dai |
Removal of misbehaving insiders in anonymous VANETs. |
MSWiM |
2009 |
DBLP DOI BibTeX RDF |
misbehaving insider, anonymity, VANET, revocation |
60 | A. Dadhich, Anil K. Sarje, K. Garg |
A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Damon McCoy, Douglas C. Sicker, Dirk Grunwald |
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Shan Chen, Brahim Bensaou, Ka-Lok Hung |
Promoting self-imposed end-to-end congestion control via a Sword of Damocles approach. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
50 | William Kozma, Loukas Lazos |
REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
routing, ad hoc networks, bloom filter, misbehavior |
47 | Sintayehu Dehnie, Nasir D. Memon |
A Stochastic Model for Misbehaving Relays in Cooperative Diversity. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, Jean-Pierre Hubaux |
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
47 | Hongxun Liu, José G. Delgado-Frias, Sirisha Medidi |
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang |
Design of multicast protocols robust against inflated subscription. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
misbehaving receivers, robust communication protocols, multicast, congestion control, fair bandwidth allocation |
38 | Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang |
Robustness to inflated subscription in multicast congestion control. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
misbehaving receivers, multicast, robustness, congestion control, fair bandwidth allocation |
37 | Katerina J. Argyraki, David R. Cheriton |
Scalable network-layer defense against internet bandwidth-flooding attacks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
denial-of-service defenses, traffic filtering, network-level security and protection |
37 | Mario Strasser, Harald Vogt |
Autonomous and distributed node recovery in wireless sensor networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
node recovery, sensor networks, intrusion detection, wireless |
37 | Sergio Marti, Thomas J. Giuli, Kevin Lai 0002, Mary Baker |
Mitigating routing misbehavior in mobile ad hoc networks. |
MobiCom |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Young-Chul Shim |
A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Rob Sherwood, Bobby Bhattacharjee, Ryan Braud |
Misbehaving TCP receivers can cause internet-wide congestion collapse. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
congestion control, distributed denial of service |
26 | Taehoon Kim, Bora Kang, Sungwoo Tak |
A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop Networks. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
misbehaving node, ad hoc networks, wireless communication, reputation |
26 | Poonam Gera, Kumkum Garg, Manoj Misra |
Trust Based Multi Path DSR Protocol. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Misbehaving nodes, Dynamic ource routing, Path trust, Trust |
26 | Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah |
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
Watchdog, TWOACK, AACK, Misbehaving, MANET, IDS, DSR, packet dropping |
26 | Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang |
Robustness of multicast congestion control to inflated subscription. |
SIGMETRICS |
2003 |
DBLP DOI BibTeX RDF |
misbehaving receivers, multicast, robustness, congestion control, fair bandwidth allocation |
25 | Sherman S. M. Chow |
Real Traceable Signatures. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
25 | Marc Dacier, Van-Hau Pham, Olivier Thonnard |
The WOMBAT Attack Attribution Method: Some Results. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein 0001 |
Adding Trust to P2P Distribution of Paid Content. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Rachid Guerraoui, Kévin Huguenin, Anne-Marie Kermarrec, Maxime Monod |
Decentralized Polling with Respectable Participants. |
OPODIS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | André König, Matthias Hollick, Ralf Steinmetz |
On the Implications of Adaptive Transmission Power for Assisting MANET Security. |
ICDCS Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
25 | Szymon Szott, Marek Natkaniec, Andrzej R. Pach |
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. |
ADHOC-NOW |
2008 |
DBLP DOI BibTeX RDF |
misbehaviour, Ad-hoc networks, IEEE 802.11e |
25 | Yang Qin, Kong Ling Pang |
A Fault-Tolerance Cluster Head Based Routing Protocol for Ad Hoc Networks. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yonglin Ren, Azzedine Boukerche |
Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ajay Gulati, Peter J. Varman |
RFQ: Redemptive Fair Queuing. |
ESA |
2008 |
DBLP DOI BibTeX RDF |
|
25 | William Kozma, Loukas Lazos |
Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits. |
SECON |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Mark Kai Ho Yeung, Yu-Kwong Kwok |
Game-theoretic scalable peer-to-peer media streaming. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Md. Abdul Hamid, Md. Shariful Islam, Choong Seon Hong |
Developing Security Solutions for Wireless Mesh Enterprise Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Sylvie Delaët, Partha Sarathi Mandal 0001, Mariusz A. Rokicki, Sébastien Tixeuil |
Deterministic Secure Positioning in Wireless Sensor Networks. |
DCOSS |
2008 |
DBLP DOI BibTeX RDF |
Secure Positioning, Wireless Sensor Network, Distributed Protocol |
25 | Jinyuan Sun, Chi Zhang 0001, Yuguang Fang |
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Erik Buchmann |
Trust Mechanisms and Reputation Systems. |
Algorithms for Sensor and Ad Hoc Networks |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jae Chung, Mark Claypool, Robert E. Kinicki |
Stochastic Fair Traffic Management for Efficient and Robust IP Networking. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Sandhya Khurana, Neelima Gupta, Nagender Aneja |
Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET). |
ICN |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Victor Ponce, Jie Wu 0001, Xiuqi Li |
Improve Peer Cooperation Using Social Networks. |
ICPP Workshops |
2007 |
DBLP DOI BibTeX RDF |
social network, trust, incentives, proximity, peer-to-peer (P2P), Balance, friendship, credit |
25 | Parag S. Mogre, Kalman Graffi, Matthias Hollick, Ralf Steinmetz |
AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Sandhya Khurana, Neelima Gupta, Nagender Aneja |
Reliable Ad-hoc On-demand Distance Vector Routing Protocol. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Lei Guang, Chadi Assi |
On the resiliency of mobile ad hoc networks to MAC layer misbehavior. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
routing, ad hoc networks |
25 | Ning Jiang, Simon Sheu, Kien A. Hua, Onur Ozyer |
A Finite-State-Model Scheme for Efficient Cooperation Enforcement in Mobile Ad Hoc Networks. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Jun Peng, Biplab Sikdar 0001 |
Multilayer multicast congestion control in satellite environments. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi |
Packet Filtering for Congestion Control under DoS Attacks. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sonja Buchegger, Jean-Yves Le Boudec |
Performance analysis of the CONFIDANT protocol. |
MobiHoc |
2002 |
DBLP DOI BibTeX RDF |
routing, mobile ad-hoc networks, trust, robustness, fairness, cooperation, reputation |
22 | Luca Ballotta, Giacomo Como, Jeff S. Shamma, Luca Schenato 0001 |
Can Competition Outperform Collaboration? The Role of Misbehaving Agents. |
IEEE Trans. Autom. Control. |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Mart Keizer, Savio Sciancalepore, Gabriele Oligeri |
GhostBuster: Detecting Misbehaving Remote ID-Enabled Drones. |
CCNC |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Emre Yildirim, Alexander Saltos, Tansel Yucelen |
Control of misbehaving multiagent networks using driver and observer nodes. |
Int. J. Syst. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Emre Yildirim, Tansel Yucelen |
Control of Multiagent Networks in the Presence of Misbehaving Nodes without the Knowledge of Global Network Objective ⋆. |
CCTA |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Emre Yildirim, Alexander Saltos, Tansel Yucelen |
Multiagent Networks with Misbehaving Nodes: Control with Driver and Observer Nodes†. |
ACC |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma |
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles. |
Int. J. Cloud Appl. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ankit Kumar, Max von Hippel, Pete Manolios, Cristina Nita-Rotaru |
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Emre Yildirim, Tansel Yucelen |
Discrete-Time Control of Multiagent Systems with a Misbehaving Node †. |
ACC |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Emre Yildirim, Tansel Yucelen |
Control of Misbehaving Multiagent Networks through Driver Nodes: The Directed Graph Case. |
CDC |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Emre Yildirim, Tansel Yucelen |
Control of multiagent networks with misbehaving nodes. |
Int. J. Syst. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Fatima Salma Sadek, Khaled Belkadi, Abdelhafid Abouaissa, Pascal Lorenz |
Identifying Misbehaving Greedy Nodes in IoT Networks. |
Sensors |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Aruna Subramanian, Subramani Appavupillai |
Trust Sensitive Dual Cluster Head Based Routing Scheme to Isolate Misbehaving Nodes in MANET. |
ISIC |
2021 |
DBLP BibTeX RDF |
|
22 | Emre Yildirim, Selahattin Burak Sarsilmaz, Ahmet Taha Koru, Tansel Yucelen |
On Control of Multiagent Systems in the Presence of a Misbehaving Agent. |
IEEE Control. Syst. Lett. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Menatalla Abououf, Hadi Otrok, Shakti Singh, Rabeb Mizouni, Anis Ouali |
A Misbehaving-Proof Game Theoretical Selection Approach for Mobile Crowd Sourcing. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Jianbing Ni, Kuan Zhang 0001, Xiaodong Lin 0001, Xuemin Sherman Shen |
Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors. |
IEEE Trans. Smart Grid |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Alessio Vecchio, Giada Anastasi, Davide Coccomini, Stefano Guazzelli, Sara Lotano, Giuliano Zara |
Labeling of Activity Recognition Datasets: Detection of Misbehaving Users. |
MobiHealth |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Menatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok |
Impact of Misbehaving Devices in Mobile Crowd Sourcing Systems. |
SERVICES |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Shunyuan Xiao, Xiaohua Ge, Qing-Long Han, Zhenwei Cao |
Resilient Distributed Target Tracking Over Sensor Networks Against Misbehaving Nodes. |
IECON |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Abdulaziz S. Almazyad |
Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks. |
Neural Comput. Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Gerardo De La Torre, Tansel Yucelen |
Adaptive architectures for resilient control of networked multiagent systems in the presence of misbehaving agents. |
Int. J. Control |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Danial Senejohnny, S. Sundaram, Claudio De Persis, Pietro Tesi |
Resilience against Misbehaving Nodes in Asynchronous Networks. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
22 | Vinay Kumar Kalakbandi |
Managing the misbehaving retailer under demand uncertainty and imperfect information. |
Eur. J. Oper. Res. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Abdesselem Beghriche, Azeddine Bilami |
A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks. |
Int. J. Intell. Comput. Cybern. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Waqar Khalid, Zahid Ullah 0003, Naveed Ahmed 0003, Yue Cao 0002, Muhammad Khalid, Muhammad Arshad 0001, Farhan Ahmad, Haitham S. Cruickshank |
A taxonomy on misbehaving nodes in delay tolerant networks. |
Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Mohammed Alotaibi, Nigel Thomas |
Performance Impact of Misbehaving Voters. |
EPEW |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Danial Senejohnny, Shreyas Sundaram, Claudio De Persis, Pietro Tesi |
Resilience against Misbehaving Nodes in Self-triggered Coordination Networks. |
CDC |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Pushpendu Kar, Sudip Misra |
Detouring dynamic routing holes in stationary wireless sensor networks in the presence of temporarily misbehaving nodes. |
Int. J. Commun. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Hichem Sedjelmaci, Sidi Mohammed Senouci, Tarek Bouali |
Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. |
Veh. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Wente Zeng, Yuan Zhang, Mo-Yuen Chow |
Resilient Distributed Energy Management Subject to Unexpected Misbehaving Generation Units. |
IEEE Trans. Ind. Informatics |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Saleem Khan, Daniele Midi, Saif Ur Rehman Malik, Majid I. Khan, Nadeem Javaid, Elisa Bertino |
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy. |
Mob. Networks Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Maha Shamseddine, Wassim Itani, Ayman I. Kayssi, Ali Chehab |
Virtualized network views for localizing misbehaving sources in SDN data planes. |
ICC |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Tianzhu Zhang, Andrea Bianco, Paolo Giaccone, Aliakbar Payandehdari Nezhad |
Dealing with Misbehaving Controllers in SDN Networks. |
GLOBECOM |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Amirali Sanatinia, Guevara Noubir |
Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
22 | Farid Bin Beshr, Ahmed Bin Ishaq, Saeed Aljabri, Tarek R. Sheltami |
A Guard Node (GN) Based Technology against Misbehaving Nodes in Manet. |
J. Ubiquitous Syst. Pervasive Networks |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Amirali Sanatinia, Guevara Noubir |
Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs. |
CNS |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman |
Vote to Link: Recovering from Misbehaving Anonymous Users. |
WPES@CCS |
2016 |
DBLP BibTeX RDF |
|
22 | Li-Chung Lo, Wan-Jen Huang, Ronald Y. Chang, Wei-Ho Chung |
Noncoherent Detection of Misbehaving Relays in Decode-and-Forward Cooperative Networks. |
IEEE Commun. Lett. |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Andreas Tsiartas, Andreas Kathol, Elizabeth Shriberg, Massimiliano de Zambotti, Adrian Willoughby |
Prediction of heart rate changes from speech features during interaction with a misbehaving dialog system. |
INTERSPEECH |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino |
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Omar Abdel Wahab 0001, Hadi Otrok, Azzam Mourad |
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. |
Comput. Commun. |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Wente Zeng, Mo-Yuen Chow |
Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems. |
IEEE Trans. Cybern. |
2014 |
DBLP DOI BibTeX RDF |
|
22 | José María de Fuentes, Jorge Blasco Alís, Ana Isabel González-Tablas Ferreres, Lorena González-Manzano |
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles. |
Int. J. Distributed Sens. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Tal Grinshpoun, Amnon Meisels, Eyal Felstaine |
Avoidance of misbehaving nodes in wireless mesh networks. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Hichem Sedjelmaci, Tarek Bouali, Sidi Mohammed Senouci |
Detection and prevention from misbehaving intruders in vehicular networks. |
GLOBECOM |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Ing-Ray Chen, Jia Guo |
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection. |
AINA |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Mohammad Al-Shurman, Mohammad G. Alfawares, Mamoun F. Al-Mistarihi, Khalid A. Darabkh |
A collaborative reputation approach to avoid misbehaving nodes in MANETs. |
SSD |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Mai Ali, Sherif M. Khattab, Reem Bahgat |
Improving Detection Accuracy in Group Testing-Based Identification of Misbehaving Data Sources. |
FiCloud |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Steven Latré, Wim Van de Meerssche, Dirk Deschrijver, Dimitri Papadimitriou, Tom Dhaene, Filip De Turck |
A cognitive accountability mechanism for penalizing misbehaving ECN-based TCP stacks. |
Int. J. Netw. Manag. |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Juan Hernández-Serrano, Olga León, Miguel Soriano |
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations. |
Comput. Electr. Eng. |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour |
Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes. |
IEEE Trans. Inf. Forensics Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Srijani Mukherjee, Koustabh Dolui, Soumya Kanti Datta |
Intelligent management of misbehaving nodes in wireless sensor networks: Using blackhole and selective forwarding node detection algorithm. |
IEEE ANTS |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin, Sharon Goldberg |
On the risk of misbehaving RPKI authorities. |
HotNets |
2013 |
DBLP DOI BibTeX RDF |
|