The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for wormholes with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2006 (15) 2007-2009 (17) 2010-2022 (15) 2023 (5)
Publication types (Num. hits)
article(20) inproceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 40 occurrences of 26 keywords

Results
Found 52 publication records. Showing 52 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Weichao Wang, Bharat K. Bhargava Visualization of wormholes in sensor networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, visualization, wormhole attacks, multi-dimensional scaling
60Radha Poovendran, Loukas Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Wireless ad hoc networks, Wormhole attack, Geometric random graphs
60Yurong Xu, Guanling Chen, James Ford, Fillia Makedon Detecting Wormhole Attacks in Wireless Sensor Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wormhole detection, Wireless sensor networks, distributed algorithm
60Gautam Das 0003, Maria Fazio, Massimo Villari, Antonio Puliafito Vulnerabilities of Internet Access Mechanisms from Mobile Ad Hoc Networks. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
51Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux Wormhole-Based Antijamming Techniques in Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF jamming DoS attacks, security, simulations, Wireless sensor networks, probabilistic analysis, wormholes
48Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Brian Rivera, Kelvin Marcus, Peter Kruus Countering False Accusations and Collusion in the Detection of In-Band Wormholes. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Paulo Veríssimo Travelling through wormholes: a new look at distributed systems models. Search on Bibsonomy SIGACT News The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Eng-Jon Ong, Richard Bowden Learning Wormholes for Sparsely Labelled Clustering. Search on Bibsonomy ICPR (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Che-Liang Chiou, Ling-Jyh Chen Poster abstract: an evaluation study of routing reliability in opportunistic networks. Search on Bibsonomy MobiHoc The full citation details ... 2008 DBLP  DOI  BibTeX  RDF routing, reliability, opportunistic networks
40Xu Su, Rajendra V. Boppana On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Nuno Ferreira Neves, Miguel Correia 0001, Paulo Veríssimo Solving Vector Consensus with a Wormhole. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Byzantine asynchronous protocols, Distributed systems, consensus
31John R. Lange, Peter A. Dinda, Fabián E. Bustamante Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF volunteer systems, honeypots, honeynets, wormholes
31Sahar Sedighpour, Srdjan Capkun, Saurabh Ganeriwal, Mani B. Srivastava Distance enlargement and reduction attacks on ultrasound ranging. Search on Bibsonomy SenSys The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attacks on ranging, ultrasonic ranging, security, wormholes
28Joanne Leong, Yuanyang Teng, Xingyu Bruce Liu, Hanseul Jun, Sven Kratz, Yu Jiang Tham, Andrés Monroy-Hernández, Brian A. Smith 0001, Rajan Vaish Social Wormholes: Exploring Preferences and Opportunities for Distributed and Physically-Grounded Social Connections. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Elizabeth O'Neill Digital wormholes. Search on Bibsonomy AI Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Pedro Henrique Ferreira de Oliveira, Geová Alencar, Ivan Carneiro Jardim, Ricardo Renan Landim On the Traversable Yukawa-Casimir Wormholes. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Joanne Leong, Yuanyang Teng, Xingyu Bruce Liu, Hanseul Jun, Sven Kratz, Yu Jiang Tham, Andrés Monroy-Hernández, Brian A. Smith 0001, Rajan Vaish Social Wormholes: Exploring Preferences and Opportunities for Distributed and Physically-Grounded Social Connections. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Guy Gaziv, Michael J. Lee, James J. DiCarlo Robustified ANNs Reveal Wormholes Between Human Category Percepts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Reigo Ban, Keigo Matsumoto, Takuji Narumi, Hideaki Kuzuoka Wormholes in VR: Teleporting Hands for Flexible Passive Haptics. Search on Bibsonomy ISMAR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Rustam Ibadov, Burkhard Kleihaus, Jutta Kunz, Sardor Murodov Scalarized Nutty Wormholes. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Kirill Bronnikov, Vladimir Krechet, Vadim Oshurko Rotating Melvin-like Universes and Wormholes in General Relativity. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Govand Salih Kadir, Ihsan Alshahib Lami Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
28René Rydhof Hansen, Christian W. Probst Modelling and Analysing Overlay Networks by Ambients with Wormholes. Search on Bibsonomy ICMU The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Christian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Thanassis Giannetsos, Tassos Dimitriou LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Konrad-Felix Krentz, Gerhard Wunder 6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity. Search on Bibsonomy TrustED@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Daniel Winograd-Cort, Paul Hudak Wormholes: introducing effects to FRP. Search on Bibsonomy Haskell The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Luis C. E. Bona, Elias P. Duarte Jr., Thiago Garrett Monitoring Pairwise Interactions to Discover Stable Wormholes in Highly Unstable Networks. Search on Bibsonomy TRIDENTCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Dezun Dong, Mo Li 0001, Yunhao Liu 0001, Xiang-Yang Li 0001, Xiangke Liao Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Xiaomeng Ban, Rik Sarkar, Jie Gao 0001 Local connectivity tests to identify wormholes in wireless networks. Search on Bibsonomy MobiHoc The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Tassos Dimitriou, Thanassis Giannetsos Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks. Search on Bibsonomy DCOSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Maarten Clements, Pavel Serdyukov, Arjen P. de Vries, Marcel J. T. Reinders Finding Wormholes with Flickr Geotags. Search on Bibsonomy ECIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Allan Greenleaf, Yaroslav Kurylev, Matti Lassas, Gunther Uhlmann Cloaking Devices, Electromagnetic Wormholes, and Transformation Optics. Search on Bibsonomy SIAM Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Huzaifa Al Nahas, Jitender S. Deogun, Eric D. Manley Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sensor networks, Energy-efficiency, Secure routing, Wormhole attacks
28Dezun Dong, Mo Li 0001, Yunhao Liu 0001, Xiang-Yang Li 0001, Xiangke Liao Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Alessandro Campi, Georg Gottlob, Ben Hoye Wormholes of Communication: Interfacing Virtual Worlds and the Real World. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Shanshan Zheng, Tao Jiang 0004, John S. Baras Performance comparison of two sequential change detection algorithms on detection of in-band wormholes. Search on Bibsonomy CISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mario Gerla Visualisation of wormholes in underwater sensor networks: a distributed approach. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks. Search on Bibsonomy IIH-MSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Asad Amir Pirzada, Chris McDonald Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2006 DBLP  BibTeX  RDF
28Peter Kruus, Daniel Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie Ivanic, Geoffrey Lawler In-Band Wormholes and Countermeasures in OLSR Networks. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Geoffrey E. Hinton, Max Welling, Andriy Mnih Wormholes Improve Contrastive Divergence. Search on Bibsonomy NIPS The full citation details ... 2003 DBLP  BibTeX  RDF
28Tony Heap, David C. Hogg Wormholes in Shape Space: Tracking Through Discontinuous Changes in Shape. Search on Bibsonomy ICCV The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sandhya Khurana, Neelima Gupta FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Sun Choi, Doo-young Kim, Do Hyeon Lee, Jae-Il Jung WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wormhole tunnel, ad hoc networks, wormhole attack, route discovery, qualnet
20Yawen Wei, Zhen Yu, Yong Guan COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim, Seung-Woo Seo WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks. Search on Bibsonomy ICUCT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, sensor network, wormhole attack
20Miguel Correia 0001, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo Low complexity Byzantine-resilient consensus. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed systems models, distributed algorithms, consensus, intrusion tolerance, Byzantine fault tolerance
20Pedro Martins, Paulo Jorge Paiva de Sousa, António Casimiro, Paulo Veríssimo Dependable Adaptive Real-Time Applications in Wormhole-based Systems. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Marc G. Millis Prospects for Breakthrough Propulsion from Physics. Search on Bibsonomy Evolvable Hardware The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #52 of 52 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license