ROUTING 1. B.A.T.M.A.N. (Better Approach to Mobile Ad-hoc Networking) (Arash Barzinmehr) http://www.open-mesh.org/projects/open-mesh/wiki 2. TBRPF (Topology Broadcast based on Reverse-Path Forwarding) (Golnaz Arashfar) http://web.archive.org/web/20120403000811/http://www.sri.com/esd/projects/tbrpf/ 3. A Novel Encounter-based Metric for Mobile Ad Hoc Networks Routing, Ad Hoc Networks, 2013 (Ahmet Aktaş) http://www.sciencedirect.com/science/article/pii/S1570870513002345 4. Hop Count Based Distance Estimation in Mobile Ad Hoc Networks: Challenges & Consequences, Ad Hoc Networks, 2014 (Aziz Girgeç) http://www.sciencedirect.com/science/article/pii/S1570870513001765 5. MQ-Routing, Mobility-, GPS- and Energy-aware Routing Protocol in MANETs, Ad Hoc Networks for Disaster Relief Scenarios, Ad Hoc Networks, 2013 (Songül Tozan) http://www.sciencedirect.com/science/article/pii/S1570870512001667 6. VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks, IEEE Transactions on Vehicular Technology, 2008 (Çağatay Kömürcü) http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04356982 7. Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks, InfoCom 2007 (Tohid T. Gogjeh) http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4215805 8. Converge and Diverge: A Geographic Routing for Delay/Disruption Tolerant Networks using a Delegation Replication Approach, IEEE Transactions on Vehicular Technology, 2013 (Murat Harmandalı) http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06409476 SECURITY 9. On the optimality of cooperative intrusion detection for resource constrained wireless networks, Computers & Security, 2013 (Emine Coştu) 10. An intrusion detection & adaptive response mechanism for MANETs, Ad Hoc Networks, 2014 (Uğur Mertoğlu) 11. A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Network, Ad Hoc Networks, 2010 (Tolga Tatlısu) 12. The Placement-Configuration Problem for Intrusion Detection Nodes in Wireless Sensor Networks, Computers & Electrical Engineering, 2013 (Ahmet Nasir) 13. A Comparative Evaluation of Intrusion Detetion Architectures for Mobile Ad Hoc Networks, Computers & Security, 2011 (Ömer Faruk) 14. Intrusion Detection in MANET using Classification Algorithms: The Effects of Cost and Model Selection, Ad Hoc Networks, 2013 (Özlem Kahraman) 15. Trust Prediction and Trust-Based Source Routing in Mobile Ad hoc Networks, Ad Hoc Networks, 2013 Mehmet (Seçkin Çevik) 16. On the tradeoff between altruism and selfishness in MANET trust management, Ad Hoc Networks, 2013 (Bahri Gökcan) 17. EMLTrust: An enhanced Machine Learning based Reputation System for MANETs, Ad Hoc Networks, 2012 (Emre Kurt) 18. Integrating Machine Learning in Ad Hoc Routing : A Wireless Adaptive Routing Protocol, International Journal of Communication Systems, 2011 (Ahmet Kutluana) http://onlinelibrary.wiley.com/doi/10.1002/dac.1202/full 19. Muton: Detecting Malicious Nodes in Disruption-Tolerant Networks, WCNC, 2010 (Fatih Güler) 20. Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording, WoWMoM 2010. (Ferdi Yıldız) 21. Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks, AdhocNets 2013. (Gonca Canan İçöz) 22. A Ferry-Based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks, 2007. (Hüseyin Poyraz) 23. Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols, IEEE Transactions on Vehicular Technology, 2013 (Kevser Karakurt) 24. Towards a Reputation-based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network, Ad Hoc Networks, 2012 (Yavuz Selim Özzengin) 25. Prospects and Problems of Wireless Communication for Underwater Sensor Networks, Wiley Special Issue on Underwater Sensor Networks, 2008 (Fehime Can) 26. An Adaptive Approach for Information Dissemination in Vehicular Ad Hoc Networks, Journal of Network and Computer Applications, 2011. (SeyedElyar Hashemsereht) http://www.sciencedirect.com/science/article/pii/S1084804511001226 27. Strategies and Techniques for Node Placement in Wireless Sensor Networks : A Survey, Ad Hoc Networks, 2008 (Torkan Givtaj) http://www.sciencedirect.com/science/article/pii/S1570870507000984 28. Security on VANETs : Privacy, Misbehaving Nodes, False Information and Secure Data Aggregation, Journal of Network and Computer Applications, 2011. (Fatih Sakız) http://www.sciencedirect.com/science/article/pii/S1084804511001317 29. SVELTE: Real-time Intrusion Detection in the Internet of Things, Ad Hoc Networks, 2013 (Ömer Mintemur) 30. Data Aggregation and Roadside Unit Placement for a VANET Traffic Information System, VANET 2008. (Abdullah Polat) http://dl.acm.org/citation.cfm?id=1410054
© Copyright 2024 Paperzz