-
http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks
2011-06-14
-
http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems
2011-03-08
-
http://ebiquity.umbc.edu/event/html/id/347/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks
2010-05-18
-
http://ebiquity.umbc.edu/event/html/id/324/Security-Through-Policy-and-Trust-in-Mobile-Ad-Hoc-Networks
2009-11-03
-
http://ebiquity.umbc.edu/event/html/id/299/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory
2009-05-06
-
http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks
2008-10-23
-
http://ebiquity.umbc.edu/event/html/id/248/Trust-based-Data-Management-in-Mobile-Ad-Hoc-Networks
2008-07-08
-
http://ebiquity.umbc.edu/event/html/id/242/Gossip-based-Outlier-Detection-for-Mobile-Ad-Hoc-Networks
2008-05-06
-
http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs
2006-10-17
-
http://ebiquity.umbc.edu/event/html/id/117/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior
2005-10-19
-
http://ebiquity.umbc.edu/project/html/id/77/Security-in-Battlefield-MANETs
2006-09-01
-
http://ebiquity.umbc.edu/project/html/id/84/Security-in-Mobile-Databases
2007-09-01
-
http://ebiquity.umbc.edu/paper/html/id/611/CAST-Context-Aware-Security-and-Trust-framework-for-Mobile-Ad-hoc-Networks-using-Policies
2013-06-01
-
http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs
2012-06-01
-
http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks
2011-11-01
-
http://ebiquity.umbc.edu/paper/html/id/526/ATM-Automated-Trust-Management-for-Mobile-Ad-hoc-Networks-Using-Support-Vector-Machine
2011-06-06
-
http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks
2010-10-20
-
http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach
2010-05-24
-
http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks
2009-08-29
-
http://ebiquity.umbc.edu/paper/html/id/452/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory
2009-05-18
-
http://ebiquity.umbc.edu/paper/html/id/424/Security-through-Collaboration-in-MANETs
2008-11-14
-
http://ebiquity.umbc.edu/paper/html/id/409/Trust-based-Data-Management-in-Mobile-Ad-Hoc-Networks
2008-07-08
-
http://ebiquity.umbc.edu/resource/html/id/139/CBMANET-overview
2005-09-19
-
http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior
2005-10-19
-
http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior
2005-10-19
-
http://ebiquity.umbc.edu/resource/html/id/177/Detecting-Misbehavior-in-MANETs-Through-Cross-Layer-Analysis-May-2006-
2006-05-04
-
http://ebiquity.umbc.edu/resource/html/id/120/MANET-IDS-Glomosim-Simulation-Files
2005-05-18
-
http://ebiquity.umbc.edu/resource/html/id/296/SMART-A-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks
2010-05-18
-
http://ebiquity.umbc.edu/resource/html/id/104/Source-code-for-MANET-IDS
2005-03-23