UMBC ebiquity

Results for tags: manet

Projects

Past Project

 Security in Battlefield MANETs.


 
 
Publications

17 Refereed Publications

2013

1. "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Distributed and Parallel Databases, June 2013, 720 downloads.

2012

2. "Security Through Collaboration and Trust in MANETs", Mobile Networks and Applications (MONET), June 2012.

2011

3. "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", Proceedings of the 2011 Military Communications Conference, November 2011, 1054 downloads.

4. "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 992 downloads.

2010

5. "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 1900 downloads, 7 citations.

2009

6. "Policy-based Malicious Peer Detection in Ad Hoc Networks ", Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1698 downloads, 4 citations.

7. "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1228 downloads, 7 citations.

2008

8. "Security through Collaboration in MANETs", Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1532 downloads, 1 citation.

9. "Trust-based Data Management in Mobile Ad Hoc Networks", University of Maryland at Baltimore County, July 2008, 1205 downloads.

10. "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 1844 downloads, 1 citation.

2007

11. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Ad Hoc Networks Journal (ADHOCNET), May 2007, 2423 downloads, 16 citations.

2006

12. "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 2694 downloads, 10 citations.

13. "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", International Journal of Wireless Information Networks, June 2006, 2933 downloads, 5 citations.

2005

14. "Secure Routing and Intrusion Detection in Ad Hoc Networks", Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 6316 downloads, 96 citations.

2004

15. "Towards Distributed Service Discovery in Pervasive Computing Environments", IEEE Transactions on Mobile Computing, July 2004, 2862 downloads, 29 citations.

2003

16. "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 5270 downloads, 42 citations.

2002

17. "GSD: A Novel Group-based Service Discovery Protocol for MANETs", 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 3284 downloads, 218 citations.

1 Non-Refereed Publication

2003

1. "Towards Distributed Service Discovery in Pervasive Computing Environments", Submitted to IEEE TMC Technical Report TR-CS-03-26, June 2003, 2675 downloads.


 
 
Additional Resources

Presentation

1. Cross-layer Analysis for Detecting Wireless Misbehavior
2. Cross-layer Analysis for Detecting Wireless Misbehavior

Poster

1. Detecting Misbehavior in MANETs Through Cross-Layer Analysis (May 2006)
 
 
Events

1. A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
    on Tuesday, March 08, 2011 from 11:00AM to 12:15PM.

2. SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks
    on Tuesday, May 18, 2010 from 10:15AM to Tuesday, 11/30/1999, 12:00AM.

3. Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
    on Wednesday, May 06, 2009 from 10:00AM to 11:30AM.

4. Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks
    on Thursday, October 23, 2008 from 09:00AM to 11:00AM.

5. Trust-based Data Management in Mobile Ad Hoc Networks
    on Tuesday, July 08, 2008 from 10:30AM to 12:30PM.

6. Research Topics in MANETs
    on Tuesday, October 17, 2006 from 11:15AM to 12:30PM.

7. Cross-layer Analysis for Detecting Wireless Misbehavior
    on Wednesday, October 19, 2005 from 10:30AM to 12:00PM.


 
 

Subscribe to RSS feed

Bookmark this page