The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Misbehaving with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2001 (19) 2002-2003 (19) 2004 (21) 2005 (16) 2006 (19) 2007 (34) 2008 (27) 2009 (29) 2010 (19) 2011-2012 (25) 2013-2015 (17) 2016-2018 (18) 2019-2023 (16) 2024 (2)
Publication types (Num. hits)
article(74) inproceedings(207)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 219 occurrences of 136 keywords

Results
Found 281 publication records. Showing 281 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
110Chen-Nee Chuah, Lakshminarayanan Subramanian, Randy H. Katz DCAP: detecting misbehaving flows via collaborative aggregate policing. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF flow-level accounting, misbehaving flow detection, traffic policing
73Tarek R. Sheltami, Anas Al-Roubaiey, Elhadi M. Shakshuki, Ashraf S. Hasan Mahmoud Video transmission enhancement in presence of misbehaving nodes in MANETs. Search on Bibsonomy Multim. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Watchdog, TWOACK, Misbehaving nodes, H264, MANET, IDS, DSR, MPEG4
73Xuejun Zhuo, Jianguo Hao, Duo Liu, Yiqi Dai Removal of misbehaving insiders in anonymous VANETs. Search on Bibsonomy MSWiM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF misbehaving insider, anonymity, VANET, revocation
60A. Dadhich, Anil K. Sarje, K. Garg A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60Damon McCoy, Douglas C. Sicker, Dirk Grunwald A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Shan Chen, Brahim Bensaou, Ka-Lok Hung Promoting self-imposed end-to-end congestion control via a Sword of Damocles approach. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50William Kozma, Loukas Lazos REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF routing, ad hoc networks, bloom filter, misbehavior
47Sintayehu Dehnie, Nasir D. Memon A Stochastic Model for Misbehaving Relays in Cooperative Diversity. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, Jean-Pierre Hubaux Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith Blacklistable anonymous credentials: blocking misbehaving users without ttps. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication
47Hongxun Liu, José G. Delgado-Frias, Sirisha Medidi Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang Design of multicast protocols robust against inflated subscription. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF misbehaving receivers, robust communication protocols, multicast, congestion control, fair bandwidth allocation
38Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang Robustness to inflated subscription in multicast congestion control. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF misbehaving receivers, multicast, robustness, congestion control, fair bandwidth allocation
37Katerina J. Argyraki, David R. Cheriton Scalable network-layer defense against internet bandwidth-flooding attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF denial-of-service defenses, traffic filtering, network-level security and protection
37Mario Strasser, Harald Vogt Autonomous and distributed node recovery in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF node recovery, sensor networks, intrusion detection, wireless
37Sergio Marti, Thomas J. Giuli, Kevin Lai 0002, Mary Baker Mitigating routing misbehavior in mobile ad hoc networks. Search on Bibsonomy MobiCom The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Young-Chul Shim A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Rob Sherwood, Bobby Bhattacharjee, Ryan Braud Misbehaving TCP receivers can cause internet-wide congestion collapse. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF congestion control, distributed denial of service
26Taehoon Kim, Bora Kang, Sungwoo Tak A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop Networks. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF misbehaving node, ad hoc networks, wireless communication, reputation
26Poonam Gera, Kumkum Garg, Manoj Misra Trust Based Multi Path DSR Protocol. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Misbehaving nodes, Dynamic ource routing, Path trust, Trust
26Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Watchdog, TWOACK, AACK, Misbehaving, MANET, IDS, DSR, packet dropping
26Sergey Gorinsky, Sugat Jain, Harrick M. Vin, Yongguang Zhang Robustness of multicast congestion control to inflated subscription. Search on Bibsonomy SIGMETRICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF misbehaving receivers, multicast, robustness, congestion control, fair bandwidth allocation
25Sherman S. M. Chow Real Traceable Signatures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures
25Marc Dacier, Van-Hau Pham, Olivier Thonnard The WOMBAT Attack Attribution Method: Some Results. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein 0001 Adding Trust to P2P Distribution of Paid Content. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Rachid Guerraoui, Kévin Huguenin, Anne-Marie Kermarrec, Maxime Monod Decentralized Polling with Respectable Participants. Search on Bibsonomy OPODIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25André König, Matthias Hollick, Ralf Steinmetz On the Implications of Adaptive Transmission Power for Assisting MANET Security. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith PEREA: towards practical TTP-free revocation in anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication
25Szymon Szott, Marek Natkaniec, Andrzej R. Pach Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF misbehaviour, Ad-hoc networks, IEEE 802.11e
25Yang Qin, Kong Ling Pang A Fault-Tolerance Cluster Head Based Routing Protocol for Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yonglin Ren, Azzedine Boukerche Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ajay Gulati, Peter J. Varman RFQ: Redemptive Fair Queuing. Search on Bibsonomy ESA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25William Kozma, Loukas Lazos Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Mark Kai Ho Yeung, Yu-Kwong Kwok Game-theoretic scalable peer-to-peer media streaming. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Md. Abdul Hamid, Md. Shariful Islam, Choong Seon Hong Developing Security Solutions for Wireless Mesh Enterprise Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Sylvie Delaët, Partha Sarathi Mandal 0001, Mariusz A. Rokicki, Sébastien Tixeuil Deterministic Secure Positioning in Wireless Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Positioning, Wireless Sensor Network, Distributed Protocol
25Jinyuan Sun, Chi Zhang 0001, Yuguang Fang A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Erik Buchmann Trust Mechanisms and Reputation Systems. Search on Bibsonomy Algorithms for Sensor and Ad Hoc Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Jae Chung, Mark Claypool, Robert E. Kinicki Stochastic Fair Traffic Management for Efficient and Robust IP Networking. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Sandhya Khurana, Neelima Gupta, Nagender Aneja Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET). Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Victor Ponce, Jie Wu 0001, Xiuqi Li Improve Peer Cooperation Using Social Networks. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF social network, trust, incentives, proximity, peer-to-peer (P2P), Balance, friendship, credit
25Parag S. Mogre, Kalman Graffi, Matthias Hollick, Ralf Steinmetz AntSec, WatchAnt, and AntRep: Innovative Security Mechanisms for Wireless Mesh Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Sandhya Khurana, Neelima Gupta, Nagender Aneja Reliable Ad-hoc On-demand Distance Vector Routing Protocol. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Lei Guang, Chadi Assi On the resiliency of mobile ad hoc networks to MAC layer misbehavior. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF routing, ad hoc networks
25Ning Jiang, Simon Sheu, Kien A. Hua, Onur Ozyer A Finite-State-Model Scheme for Efficient Cooperation Enforcement in Mobile Ad Hoc Networks. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Jun Peng, Biplab Sikdar 0001 Multilayer multicast congestion control in satellite environments. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi Packet Filtering for Congestion Control under DoS Attacks. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Sonja Buchegger, Jean-Yves Le Boudec Performance analysis of the CONFIDANT protocol. Search on Bibsonomy MobiHoc The full citation details ... 2002 DBLP  DOI  BibTeX  RDF routing, mobile ad-hoc networks, trust, robustness, fairness, cooperation, reputation
22Luca Ballotta, Giacomo Como, Jeff S. Shamma, Luca Schenato 0001 Can Competition Outperform Collaboration? The Role of Misbehaving Agents. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Mart Keizer, Savio Sciancalepore, Gabriele Oligeri GhostBuster: Detecting Misbehaving Remote ID-Enabled Drones. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Emre Yildirim, Alexander Saltos, Tansel Yucelen Control of misbehaving multiagent networks using driver and observer nodes. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Emre Yildirim, Tansel Yucelen Control of Multiagent Networks in the Presence of Misbehaving Nodes without the Knowledge of Global Network Objective ⋆. Search on Bibsonomy CCTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Emre Yildirim, Alexander Saltos, Tansel Yucelen Multiagent Networks with Misbehaving Nodes: Control with Driver and Observer Nodes†. Search on Bibsonomy ACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles. Search on Bibsonomy Int. J. Cloud Appl. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ankit Kumar, Max von Hippel, Pete Manolios, Cristina Nita-Rotaru Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Emre Yildirim, Tansel Yucelen Discrete-Time Control of Multiagent Systems with a Misbehaving Node †. Search on Bibsonomy ACC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Emre Yildirim, Tansel Yucelen Control of Misbehaving Multiagent Networks through Driver Nodes: The Directed Graph Case. Search on Bibsonomy CDC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Emre Yildirim, Tansel Yucelen Control of multiagent networks with misbehaving nodes. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Fatima Salma Sadek, Khaled Belkadi, Abdelhafid Abouaissa, Pascal Lorenz Identifying Misbehaving Greedy Nodes in IoT Networks. Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Aruna Subramanian, Subramani Appavupillai Trust Sensitive Dual Cluster Head Based Routing Scheme to Isolate Misbehaving Nodes in MANET. Search on Bibsonomy ISIC The full citation details ... 2021 DBLP  BibTeX  RDF
22Emre Yildirim, Selahattin Burak Sarsilmaz, Ahmet Taha Koru, Tansel Yucelen On Control of Multiagent Systems in the Presence of a Misbehaving Agent. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Menatalla Abououf, Hadi Otrok, Shakti Singh, Rabeb Mizouni, Anis Ouali A Misbehaving-Proof Game Theoretical Selection Approach for Mobile Crowd Sourcing. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Jianbing Ni, Kuan Zhang 0001, Xiaodong Lin 0001, Xuemin Sherman Shen Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Alessio Vecchio, Giada Anastasi, Davide Coccomini, Stefano Guazzelli, Sara Lotano, Giuliano Zara Labeling of Activity Recognition Datasets: Detection of Misbehaving Users. Search on Bibsonomy MobiHealth The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Menatalla Abououf, Shakti Singh, Rabeb Mizouni, Hadi Otrok Impact of Misbehaving Devices in Mobile Crowd Sourcing Systems. Search on Bibsonomy SERVICES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Shunyuan Xiao, Xiaohua Ge, Qing-Long Han, Zhenwei Cao Resilient Distributed Target Tracking Over Sensor Networks Against Misbehaving Nodes. Search on Bibsonomy IECON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Abdulaziz S. Almazyad Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Gerardo De La Torre, Tansel Yucelen Adaptive architectures for resilient control of networked multiagent systems in the presence of misbehaving agents. Search on Bibsonomy Int. J. Control The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Danial Senejohnny, S. Sundaram, Claudio De Persis, Pietro Tesi Resilience against Misbehaving Nodes in Asynchronous Networks. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
22Vinay Kumar Kalakbandi Managing the misbehaving retailer under demand uncertainty and imperfect information. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Abdesselem Beghriche, Azeddine Bilami A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks. Search on Bibsonomy Int. J. Intell. Comput. Cybern. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Waqar Khalid, Zahid Ullah 0003, Naveed Ahmed 0003, Yue Cao 0002, Muhammad Khalid, Muhammad Arshad 0001, Farhan Ahmad, Haitham S. Cruickshank A taxonomy on misbehaving nodes in delay tolerant networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Mohammed Alotaibi, Nigel Thomas Performance Impact of Misbehaving Voters. Search on Bibsonomy EPEW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Danial Senejohnny, Shreyas Sundaram, Claudio De Persis, Pietro Tesi Resilience against Misbehaving Nodes in Self-triggered Coordination Networks. Search on Bibsonomy CDC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Pushpendu Kar, Sudip Misra Detouring dynamic routing holes in stationary wireless sensor networks in the presence of temporarily misbehaving nodes. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Hichem Sedjelmaci, Sidi Mohammed Senouci, Tarek Bouali Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. Search on Bibsonomy Veh. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Wente Zeng, Yuan Zhang, Mo-Yuen Chow Resilient Distributed Energy Management Subject to Unexpected Misbehaving Generation Units. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Muhammad Saleem Khan, Daniele Midi, Saif Ur Rehman Malik, Majid I. Khan, Nadeem Javaid, Elisa Bertino Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Maha Shamseddine, Wassim Itani, Ayman I. Kayssi, Ali Chehab Virtualized network views for localizing misbehaving sources in SDN data planes. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Tianzhu Zhang, Andrea Bianco, Paolo Giaccone, Aliakbar Payandehdari Nezhad Dealing with Misbehaving Controllers in SDN Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Amirali Sanatinia, Guevara Noubir Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
22Farid Bin Beshr, Ahmed Bin Ishaq, Saeed Aljabri, Tarek R. Sheltami A Guard Node (GN) Based Technology against Misbehaving Nodes in Manet. Search on Bibsonomy J. Ubiquitous Syst. Pervasive Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Amirali Sanatinia, Guevara Noubir Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman Vote to Link: Recovering from Misbehaving Anonymous Users. Search on Bibsonomy WPES@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
22Li-Chung Lo, Wan-Jen Huang, Ronald Y. Chang, Wei-Ho Chung Noncoherent Detection of Misbehaving Relays in Decode-and-Forward Cooperative Networks. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Andreas Tsiartas, Andreas Kathol, Elizabeth Shriberg, Massimiliano de Zambotti, Adrian Willoughby Prediction of heart rate changes from speech features during interaction with a misbehaving dialog system. Search on Bibsonomy INTERSPEECH The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Omar Abdel Wahab 0001, Hadi Otrok, Azzam Mourad A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles. Search on Bibsonomy Comput. Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Wente Zeng, Mo-Yuen Chow Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22José María de Fuentes, Jorge Blasco Alís, Ana Isabel González-Tablas Ferreres, Lorena González-Manzano Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Tal Grinshpoun, Amnon Meisels, Eyal Felstaine Avoidance of misbehaving nodes in wireless mesh networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Hichem Sedjelmaci, Tarek Bouali, Sidi Mohammed Senouci Detection and prevention from misbehaving intruders in vehicular networks. Search on Bibsonomy GLOBECOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Ing-Ray Chen, Jia Guo Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection. Search on Bibsonomy AINA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Mohammad Al-Shurman, Mohammad G. Alfawares, Mamoun F. Al-Mistarihi, Khalid A. Darabkh A collaborative reputation approach to avoid misbehaving nodes in MANETs. Search on Bibsonomy SSD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Mai Ali, Sherif M. Khattab, Reem Bahgat Improving Detection Accuracy in Group Testing-Based Identification of Misbehaving Data Sources. Search on Bibsonomy FiCloud The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Steven Latré, Wim Van de Meerssche, Dirk Deschrijver, Dimitri Papadimitriou, Tom Dhaene, Filip De Turck A cognitive accountability mechanism for penalizing misbehaving ECN-based TCP stacks. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Juan Hernández-Serrano, Olga León, Miguel Soriano WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Erfan Soltanmohammadi, Mahdi Orooji, Mort Naraghi-Pour Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Srijani Mukherjee, Koustabh Dolui, Soumya Kanti Datta Intelligent management of misbehaving nodes in wireless sensor networks: Using blackhole and selective forwarding node detection algorithm. Search on Bibsonomy IEEE ANTS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Danny Cooper, Ethan Heilman, Kyle Brogle, Leonid Reyzin, Sharon Goldberg On the risk of misbehaving RPKI authorities. Search on Bibsonomy HotNets The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 281 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license