Author:
McDaniel Patrick,Krishnamurthy Srikanth V.,Neamtiu Iulian,Jaeger Trent,La Porta Thomas F.,Papernot Nicolas,Walls Robert J.,Kott Alexander,Marvel Lisa,Swami Ananthram,Mohapatra Prasant
Reference15 articles.
1. T. Azim, I. Neamtiu, and L. Marvel. Towards self-healing smartphone software via automated patching. In 29th IEEE/ACM International Conference on Automated Software Engineering (New ideas track), ASE 2014, September 2014.
2. H. Choi, P. McDaniel, and T. L. Porta. Privacy Preserving Communication in MANETs. Proc. of IEEE SECON, 2007.
3. J. Eriksson, M. Faloutsos, and S. V. Krishnamurthy. Routing amid colluding attackers. In In ICNP '07, 2007.
4. L. Eschenauer and V. Gligor. A key management scheme for distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2002.
5. V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of service attacks at the mac layer in wireless ad hoc networks. In MILCOM 2002. Proceedings, volume 2, pages 1118--1123. IEEE, 2002.
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Moving Target Defense Games for Cyber Security: Theory and Applications;Game Theory and Machine Learning for Cyber Security;2021-09-12
2. Static Analysis Opportunities for Improving Agile and Moving Target Defenses;Proceedings of the 7th ACM Workshop on Moving Target Defense;2020-11-09
3. STRAM;ACM Computing Surveys;2019-11-30
4. Index;Game Theory for Next Generation Wireless and Communication Networks;2019-07-31
5. Security;Game Theory for Next Generation Wireless and Communication Networks;2019-07-31