4.4 Article

Iris-based continuous authentication in mobile ad hoc network

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Malware Propagations in Wireless Ad Hoc Networks

Bo Liu et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Engineering, Electrical & Electronic

Generalized Cooperative Multicast in Mobile Ad Hoc Networks

Bin Yang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Telecommunications

Analytic Hierarchy Processes for Spectrum Sharing in 5G New Radio Standard

R. Kalidoss et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Mitigation of co-channel interferences in cognitive multi-carrier code division multiple access system by singular value decomposition techniques

I. Nelson et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Nadav Schweitzer et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Article Engineering, Electrical & Electronic

A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks

Ningrinla Marchang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Automation & Control Systems

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Jonathan Ponniah et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Engineering, Civil

ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks

Wenjia Li et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Engineering, Civil

Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks

Pandi Vijayakumar et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Computer Science, Theory & Methods

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

David Menotti et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Automation & Control Systems

EAACK-A Secure Intrusion-Detection System for MANETs

Elhadi M. Shakshuki et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2013)

Article Computer Science, Information Systems

On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks

Rajendra V. Boppana et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2011)

Article Computer Science, Hardware & Architecture

Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks

Jin-Hee Cho et al.

IEEE TRANSACTIONS ON RELIABILITY (2010)

Article Computer Science, Artificial Intelligence

Iris recognition on edge maps

N. Sudha et al.

IET COMPUTER VISION (2009)

Article Computer Science, Hardware & Architecture

Impact of denial of service attacks on ad hoc networks

Imad Aad et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2008)

Article Computer Science, Information Systems

Intrusion detection techniques for mobile wireless networks

YG Zhang et al.

WIRELESS NETWORKS (2003)

Article Computer Science, Software Engineering

Defending yourself: The role of intrusion detection systems

J McHugh et al.

IEEE SOFTWARE (2000)