Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Manshaei, Mohammad Hossein
Félegyházi, Márk
Freudiger, Julien
Hubaux, Jean-Pierre
and
Marbach, Peter
2007.
Cognitive Wireless Networks.
p.
555.
Badonnel, Remi
and
Burgess, Mark
2007.
Managing Virtualization of Networks and Services.
Vol. 4785,
Issue. ,
p.
62.
Liu, Kejun
Deng, Jing
Varshney, Pramod K.
and
Balakrishnan, Kashyap
2007.
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs.
IEEE Transactions on Mobile Computing,
Vol. 6,
Issue. 5,
p.
536.
Khan, Rasib Hassan
Imtiaz-ud-Din, K. M.
Faruq, Abdullah Ali
Abu Raihan Mostofa Kamal
and
Mottalib, Abdul
2008.
A security adaptive protocol suite: Ranked Neighbor Discovery (RND) and Security Adaptive AODV (SA-AODV).
p.
588.
Xi, Y.
and
Yeh, E. M.
2008.
Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks.
p.
1463.
Katz, Jonathan
2008.
Theory of Cryptography.
Vol. 4948,
Issue. ,
p.
251.
Yufang Xi
and
Yeh, Edmund M.
2008.
Equilibria and price of anarchy in parallel relay networks with node pricing.
p.
944.
Xinxin Fan
and
Gong, Guang
2008.
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks.
p.
958.
Fanaei, Mohammad
Fanian, Ali
and
Berenjkoub, Mehdi
2008.
Advances in Computer Science and Engineering.
Vol. 6,
Issue. ,
p.
994.
Fanaei, Mohammad
Berenjkoub, Mehdi
and
Fanian, Ali
2008.
Resistant TIK-Based endairA Against the Tunneling Attack.
p.
1461.
Zhang, Nan
Yu, Wei
Fu, Xinwen
and
Das, Sajal K.
2008.
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
p.
501.
Caballero-Gil, P.
and
Hernández-Goya, C.
2008.
Cooperative Design, Visualization, and Engineering.
Vol. 5220,
Issue. ,
p.
286.
Faigl, Zoltán
Brunstrom, Anna
and
Lindskog, Stefan
2008.
Adaptation and Cross Layer Design in Wireless Networks.
p.
451.
Hernández-Goya, C.
Caballero-Gil, P.
Molina-Gil, J.
and
Caballero-Gil, C.
2009.
Computer Aided Systems Theory - EUROCAST 2009.
Vol. 5717,
Issue. ,
p.
429.
Garcin, Florent
Manshaei, Mohammad Hossein
and
Hubaux, Jean-Pierre
2009.
Cooperation in underwater sensor networks.
p.
540.
Raza, Shahid
Slabbert, Adriaan
Voigt, Thiemo
and
Landernas, Krister
2009.
Security considerations for the WirelessHART protocol.
p.
1.
Ma, Jianfeng
Wang, Changguang
and
Ma, Zhuo
2009.
Security Access in Wireless Local Area Networks.
p.
29.
Xi, Yufang
and
Yeh, Edmund M.
2009.
Pricing, competition, and routing in relay networks.
p.
507.
Yang, Shengbo
Zhong, Feng
Yeo, Chai Kiat
Lee, Bu Sung
and
Boleng, Jeff
2009.
Position Based Opportunistic Routing for Robust Data Delivery in MANETs.
p.
1.
Mari, Federico
Melatti, Igor
Salvo, Ivano
Tronci, Enrico
Alvisi, Lorenzo
Clement, Allen
and
Li, Harry
2009.
Stabilization, Safety, and Security of Distributed Systems.
Vol. 5873,
Issue. ,
p.
531.