Intelligent security auditing based on access control of devices in Ad Hoc network

被引:0
|
作者
Department of Computer Science and Technology, Donghua University, Shanghai 201620, China [1 ]
不详 [2 ]
机构
来源
J. Donghua Univ. | 2006年 / 6卷 / 50-52期
关键词
6;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] An intelligent network algorithm for enhanced security in a mobile ad hoc network
    Roopa, M.
    Selvakumar Raja, S.
    International Journal of Networking and Virtual Organisations, 2017, 17 (2-3) : 126 - 136
  • [2] An Access Control Framework in an Ad Hoc Network Infrastructure
    Araghi, Tanya Koohpayeh
    Zamani, Mazdak
    Manaf, A. A.
    Araghi, Sagheb Kohpayeh
    ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
  • [3] Privacy and Security of Vehicular Ad Hoc Network in Intelligent Transport System
    Sunil, G.
    Akkur, Malatesh
    Kapila, Dhiraj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 1111 - 1118
  • [4] Security of Ad Hoc Network
    Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications
    ZTECommunications, 2007, (04) : 24 - 26
  • [5] Multicast medium access control in wireless ad hoc network
    Lau, KS
    Pao, D
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 1903 - 1908
  • [6] Network access control for mobile ad-hoc networks
    Wang, P
    Ning, P
    Reeves, DS
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 350 - 362
  • [7] Data Auditing for Intelligent Network Security Monitoring
    Hong, SeukGue
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 74 - 79
  • [8] An Overview of Ad Hoc Network Security
    Yang, Fan
    Zheng, Yulan
    Xiong, Ping
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 129 - 137
  • [9] A novel medium access control (MAC) protocol for ad hoc network
    Ren, QC
    Guo, W
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 521 - 524
  • [10] Ad hoc extensibility and access control
    Microsoft Research, Silicon Valley
    Oper Syst Rev ACM, 2006, 3 (93-101):