Author:
Tanachaiwiwat Sapon,Helmy Ahmed
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference18 articles.
1. F. Castaneda, E.C. Sezer, J. Xu, WORM vs. WORM: preliminary study of an active counter-attack mechanism, in: ACM Workshop on Rapid Malcode, 2004.
2. Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms, in: IEEE INFOCOM 2003.
3. D.E. Cooper, P. Ezhilchelvan, I. Mitrani, A family of encounter-based broadcast protocols for mobile ad-hoc networks, in: Proceedings of the Wireless Systems and Mobility in Next Generation Internet. First International Workshop of the EURO-NGI Network of Excellence, Dagstuhl Castle, Germany, June 7–9 2004.
4. W. Hsu, A. Helmy, On nodal encounter patterns in wireless LAN traces, in: The Second IEEE Int. l Workshop on Wireless Network Measurement (WiNMee), April 2006.
5. W. Hsu, A. Helmy, On modeling user associations in wireless LAN traces on university campuses, in: The Second IEEE Int. l Workshop on Wireless Network Measurement (WiNMee), April 2006.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献