References
- Ad Hoc Mobile Wireless Networks C.K.Toch.
- IEEE ICNP Providing robust and ubiquitous security support for mobile ad-hoc networks J.Kong;P.Zerfos;H.Luo;S.Lu;L.Zhang
- ACM Mobicom Intrusion detection in wireless ad-hoc networks Y.Zhang;W.Lee
- PAMPAS Workshop Distributed security: ad hod network & beyond K.Wrona
- IEEE Network Securing ad hoc networks L.Zhou;Z.Haas
- IEEE Security & Privacy The resurrecting duckling: security issues for ubiquitous computing F.Stajano;R.Anderson
- IEEE MILCOM Denial of service attacks at the MAC layer in wireless ad hoc networks V.Gupat;S.Krishnamurthy
- IEEE Computer Denial of service in sensor networks A.Wood;J.Stankovic
- European Wireless Conference Simulationbased analysis of security exposures in mobile ad hoc networks P.Michiardi;R.Molva
- Technical Report Diagnosing and penalizing MAC layer misbehavior in wireless networks P.Kyasanur;N.Vaidya
- Snapshot Release 1.1.1 The CMU Monarch project's wireless and mobility extensions to ns Carnegie mellon University