<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks 2011-06-14 <![CDATA[A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems]]> http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems 2011-03-08 <![CDATA[SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/347/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks 2010-05-18 <![CDATA[Security Through Policy and Trust in Mobile Ad Hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks 2009-11-03 <![CDATA[Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory]]> http://ebiquity.umbc.edu/event/html/id/299/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory 2009-05-06 <![CDATA[Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks 2008-10-23 <![CDATA[Trust-based Data Management in Mobile Ad Hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/248/Trust-based-Data-Management-in-Mobile-Ad-Hoc-Networks 2008-07-08 <![CDATA[Gossip-based Outlier Detection for Mobile Ad Hoc Networks]]> http://ebiquity.umbc.edu/event/html/id/242/Gossip-based-Outlier-Detection-for-Mobile-Ad-Hoc-Networks 2008-05-06 <![CDATA[Research Topics in MANETs]]> http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs 2006-10-17 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/event/html/id/117/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Security in Battlefield MANETs]]> http://ebiquity.umbc.edu/project/html/id/77/Security-in-Battlefield-MANETs 2006-09-01 <![CDATA[Security in Mobile Databases]]> http://ebiquity.umbc.edu/project/html/id/84/Security-in-Mobile-Databases 2007-09-01 <![CDATA[CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies]]> http://ebiquity.umbc.edu/paper/html/id/611/CAST-Context-Aware-Security-and-Trust-framework-for-Mobile-Ad-hoc-Networks-using-Policies 2013-06-01 <![CDATA[Security Through Collaboration and Trust in MANETs]]> http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs 2012-06-01 <![CDATA[SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks]]> http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks 2011-11-01 <![CDATA[ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine]]> http://ebiquity.umbc.edu/paper/html/id/526/ATM-Automated-Trust-Management-for-Mobile-Ad-hoc-Networks-Using-Support-Vector-Machine 2011-06-06 <![CDATA[SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]> http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks 2010-10-20 <![CDATA[Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach]]> http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach 2010-05-24 <![CDATA[Policy-based Malicious Peer Detection in Ad Hoc Networks]]> http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks 2009-08-29 <![CDATA[Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory]]> http://ebiquity.umbc.edu/paper/html/id/452/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory 2009-05-18 <![CDATA[Security through Collaboration in MANETs]]> http://ebiquity.umbc.edu/paper/html/id/424/Security-through-Collaboration-in-MANETs 2008-11-14 <![CDATA[Trust-based Data Management in Mobile Ad Hoc Networks]]> http://ebiquity.umbc.edu/paper/html/id/409/Trust-based-Data-Management-in-Mobile-Ad-Hoc-Networks 2008-07-08 <![CDATA[CBMANET overview]]> http://ebiquity.umbc.edu/resource/html/id/139/CBMANET-overview 2005-09-19 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]> http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior 2005-10-19 <![CDATA[Detecting Misbehavior in MANETs Through Cross-Layer Analysis (May 2006)]]> http://ebiquity.umbc.edu/resource/html/id/177/Detecting-Misbehavior-in-MANETs-Through-Cross-Layer-Analysis-May-2006- 2006-05-04 <![CDATA[MANET IDS Glomosim Simulation Files]]> http://ebiquity.umbc.edu/resource/html/id/120/MANET-IDS-Glomosim-Simulation-Files 2005-05-18 <![CDATA[SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]> http://ebiquity.umbc.edu/resource/html/id/296/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks 2010-05-18 <![CDATA[Source code for MANET IDS]]> http://ebiquity.umbc.edu/resource/html/id/104/Source-code-for-MANET-IDS 2005-03-23