Number of uses: 3
Tagged 3 resources
- Jim Parker, "Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks", PhdThesis, University of Maryland, Baltimore County, October 23, 2008.
- Wenjia Li, Anupam Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, Proceedings of the 10th International Conference on Mobile Data Management (MDM 2009), May 18, 2009, 112 downloads.
- Wenjia Li, Anupam Joshi, Tim Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, August 29, 2009.