A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Proceedings of the 9th annual international conference on Mobile computing and networking
Cooperation Issues in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Reputation-based Wi-Fi deployment protocols and security analysis
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
A Game-Theoretic Analysis on the Conditions of Cooperation in a Wireless Ad Hoc Network
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Proceedings of the 11th annual international conference on Mobile computing and networking
Certain limitations of reputation--based schemes in mobile environments
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Reputation-based Wi-Fi deployment
ACM SIGMOBILE Mobile Computing and Communications Review
Cooperation in wireless ad hoc networks: a market-based approach
IEEE/ACM Transactions on Networking (TON)
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Cooperation monitoring issues in ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Incentive mechanism design for selfish hybrid wireless relay networks
Mobile Networks and Applications
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Evolution of cooperation in ad hoc networks under game theoretic model
Proceedings of the 4th ACM international workshop on Mobility management and wireless access
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Reputation in self-organized communication systems and beyond
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Cooperation Enhancement for Message Transmission in VANETs
Wireless Personal Communications: An International Journal
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Enabling a cooperative strategy in mobile ad-hoc networks
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
A novel approach for creating trust to reduce malicious behavior in MANET
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
SNARE: sensor node attached reputation evaluator
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
MMAN - a monitor for mobile ad hoc networks: design, implementation, and experimental evaluation
Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
REFACING: An autonomic approach to network security based on multidimensional trustworthiness
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network
Computational Intelligence and Security
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
An approach for promoting contribution in GAF-based ad hoc networks: design and implementation
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Dynamic reputation-based incentive mechanism considering heterogeneous networks
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Games to induce specified equilibria
Theoretical Computer Science
Fuzzy Logic Based Reputation System for Mobile Ad Hoc Networks
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
An incentive compatible reputation mechanism for ubiquitous computing environments
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Proceedings of the second ACM conference on Wireless network security
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
On eliminating packet droppers in MANET: A modular solution
Ad Hoc Networks
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Distributed data source verification in wireless sensor networks
Information Fusion
Impact of Misbehaviour on QoS in Wireless Mesh Networks
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
A Coalitional Game Model for Heat Diffusion Based Incentive Routing and Forwarding Scheme
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Path-Based Reputation System for MANET Routing
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Barter trade improves message delivery in opportunistic networks
Ad Hoc Networks
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
Reliable and efficient forwarding in ad hoc networks
Ad Hoc Networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
Cooperation through self-similar social networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
COFFEE: a context-free protocol for stimulating data forwarding in wireless ad hoc networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
An Architecture for Dynamic Trust Monitoring in Mobile Networks
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access point evaluation using packet transfer ratio in multihop wireless networks
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
Incentives for P2P file sharing in mobile ad hoc networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
A reliable routing model based on the residual energy in MANET
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Private location-based information retrieval through user collaboration
Computer Communications
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
Security issues in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Reputation-based routing in hybrid ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A trust approach for node cooperation in MANET
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Analysis of distributed packet forwarding trategies in ad hoc networks
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
An analytical model of routing, misbehavior, and countermeasures in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cooperative strategy by Stackelberg games under energy constraint in multi-hop relay networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Distributed data-theft detection in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Comparison of access control methods in mobile as-hoc networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Game-theoretic approach for improving cooperation in wireless multihop networks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Bandwidth exchange: an energy conserving incentive mechanism for cooperation
IEEE Transactions on Wireless Communications
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy and confidentiality in context-based and epidemic forwarding
Computer Communications
A cross-layer route discovery strategy for virtual currency systems in mobile ad hoc networks
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Rating the raters: a reputation system for wiki-like domains
Proceedings of the 3rd international conference on Security of information and networks
Reliable data fusion in wireless sensor networks: a dynamic Bayesian game approach
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
An efficient reputation-based mechanism to enforce cooperation in MANETs
CIT'10 Proceedings of the 4th international conference on Communications and information technology
A gradual solution to detect selfish nodes in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Are you contributing trustworthy data?: the case for a reputation system in participatory sensing
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Probabilistic packet relaying in wireless mobile ad hoc networks
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II
cTrust: trust aggregation in cyclic mobile ad hoc networks
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
IEEE Transactions on Communications
A proactive data security framework for mission-critical sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Perspectives of selfish behaviour in mobile ad hoc networks
NMA'10 Proceedings of the 7th international conference on Numerical methods and applications
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs
Proceedings of the 2011 International Conference on Communication, Computing & Security
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Misbehaving nodes detection through opinion based trust evaluation model in MANETs
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A combinational perspective in stimulating cooperation in mobile ad hoc networks
Journal of Computer Science and Technology
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Mobility in collaborative alert systems: building trust through reputation
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
Mechanisms to induce random choice
WINE'06 Proceedings of the Second international conference on Internet and Network Economics
Reputation based localized access control for mobile ad-hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Threats to security in DSRC/WAVE
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Compact stimulation mechanism for routing discovery protocols in civilian ad-hoc networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Spontaneous cooperation in multi-domain sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Towards cheat-proof cooperative relay for cognitive radio networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Trustpert: a reputation model for collaboration in MANETs using fuzzy expert systems
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Bounding trust in reputation systems with incomplete information
Proceedings of the second ACM conference on Data and Application Security and Privacy
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Engineering incentive schemes for ad hoc networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
Journal of Network and Computer Applications
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
Locally multipath adaptive routing protocol resilient to selfishness and wormholes
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A statistical mechanics approach to trust management in autonomic networks
International Journal of Systems, Control and Communications
A novel acknowledgment-based approach against collude attacks in MANET
Expert Systems with Applications: An International Journal
ASRBAC: a security administration model for mobile autonomic networks (MAutoNets)
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
A game theory-based surveillance mechanism against suspicious insiders in MANETs
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Solving soft security problem in MANETs using an evolutionary approach
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
On effectiveness of cooperation enforcement mechanisms in wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Heterogeneous secure multi-party computation
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II
Evolutionary reputation model for node selfishness resistance in opportunistic networks
Concurrency and Computation: Practice & Experience
A strategic reputation-based mechanism for mobile ad hoc networks
Canadian AI'12 Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Availability modelling of a virtual black box for automotive systems
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
AODV-based technique for quick and secure local recovery from link failures in MANETs
International Journal of Communication Networks and Distributed Systems
GEographic multicast (GEM) for dense wireless networks: protocol design and performance analysis
IEEE/ACM Transactions on Networking (TON)
The Impact of Cooperative Nodes on the Performance of Vehicular Delay-Tolerant Networks
Mobile Networks and Applications
Wireless Personal Communications: An International Journal
A Security Differential Game Model for Sensor Networks in Context of the Internet of Things
Wireless Personal Communications: An International Journal
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles
Computer Communications
Wireless Personal Communications: An International Journal
Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |