فهرست و منابع پایان نامه شبکه هاب ادهاک متحرک
فهرست:
ندارد.
منبع:
[1] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, IEEE Press, vol. 13, no. 6, 1999, pp. 24–30.
[2] A. Perrig, Y-C Hu, D. B. Johnson, Wormhole Protection in Wireless Ad Hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University.
[3] P. Papadimitratos, Z. Haas, Secure Routing for Mobile Ad Hoc Networks, in proceedings of CNDS 2002.
[4] Y-C Hu, A. Perrig, D. B. Johnson, Ariadne : A secure On-Demand Routing Protocol for Ad Hoc Networks, in proceedings of MOBICOM 2002.
[5] B. Dahill, B. N. Levine, E. Royer, C. Shields, ARAN: A secure Routing Protocol for Ad Hoc Networks, UMass Tech Report 02-32, 2002.
[6] Y-C Hu, D. B. Johnson, A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, in the Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[7] P. Michiardi, R. Molva, Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks, in proceedings of European Wireless Conference, 2002.
[8] L. Buttyan, J. P. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks, Technical Report DSC/2001/001, Swiss Federal Institute of Technology -- Lausanne, 2001.
[9] S. Buchegger, J. Y. Le Boudec, Performance Analysis of the CONFIDANT Protocol, in proceedings of MobiHoc 2002.
[10] P. Michiardi, R. Molva, Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, IFIP - Communication and Multimedia Security Conference 2002.
[11] P. Michiardi, R. Molva, Game Theoretic Analysis of Security in Mobile Ad Hoc Networks, Institut Eurecom Research Report RR-02-070 - April 2002.
[12] H. Yang, X. Meng, S. Lu, Self-Organized Network-Layer Security in Mobile Ad Hoc Networks.
[13] S. Capkun, L. Buttyan and J-P Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, in ACM International Workshop on Wireless Security, WiSe 2002.
[14] Pietro Michiardi, Refik Molva, Ad hoc networks security, Technical Report, 2003.
[15] Y. Hu, A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE COMPUTER SOCIETY Journal, 2004.
[16]K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding-Royer, “ARAN: A Secure Routing Protocol for Ad Hoc Networks”, UMass Tech Report 02-32, 2002
[17]Y. Hu, D. B. Johnson, A. Perrig, “ARIADNE: A Secure On-Demand Routing Protocol for Ad Hoc Networks”, in proceedings of MOBICOM 2002
[18]C. E. Perkins, E. M. Royer, and S. R. Das, Ad-hoc On-demand Distance Vector (AODV) routing, IETF MANET Group, Jan 2002
[19]D. B. Johnson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, The Dynamic Source Routing Protocol for Mobile Ad-hoc Networks, IETF MANET Group, Feb 2002
[20]S. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks”, Proc. of IEEE ICC, Vol.10, pp.3201-3205, May 2001
[21] Barry Michael ,McGrath Sean, QoS Techniques in Ad Hoc NetworksWireless, Access Research Group, ECE Dept, University of Limerick, Limerick, Ireland
[22] T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. Siva Ram Murthy , Quality of service provisioning in ad hoc wireless networks:a survey of issues and solutionsq,
Department of Computer Science and Engineering, Indian Institute of Technology, Madras 600036, India ,Received 15 February 2004; accepted 14 April 2004,Available online 5 June 2004
[24] Rajarshi Gupta, Zhanfeng Jia, Teresa Tung, and Jean Walrand, Interference-aware QoS Routing (IQRouting)for Ad-Hoc Networks, University of California, Berkeley,fguptar, jia, teresat, [email protected]
[25] Xukai Zou, Byrav Ramamurthy and Spyros Magliveras, Routing Techniques in Wireless Ad Hoc Networks|Classi_cation and Comparison, Dept. of Computer Science and Engineering _Dept. Of Mathematical Sciences ,University of Nebraska-Lincoln Florida Atlantic University
[26] YUANZHU PETER CHENy, ARTHUR L. LIESTMANy, AND JIANGCHUAN LIU,
CLUSTERING ALGORITHMSFOR AD HOC WIRELESS NETWORKS,
[27] Caccamo Marco , RT-QoS for Wireless ad-hoc Networks ofEmbedded Systems,
University of Illinois,Urbana-Champaign
[28] L. Hanzo (II.) and R. Tafazolli , A Survey of QoS Routing Solutions for Mobile
Ad hoc Networks, Centre for Communication Systems Research (CCSR)
University of Surrey, UK
[29] Abbas Tarar Qamar ,Optimized Link State Routing Protocol for Ad Hoc Networks,
[30] Kim, Sang-Chul; Shin, KeeHyun , A Performance Analysis of MANET Multicast Routing Algorithms with Multiple Sources, Software Engineering Research, Management & Applications, 2007. SERA 2007. 5th ACIS International Conference
[31] Prof. Xiaohua Jia , QoS Topology Control and Energy Efficient Routing
in Ad hoc Wireless Networks, Dept of Computer Science, City Univ of Hong Kong
[32] Bijendra Jain with contributions from A. M. Abbas, A. Agarwal, Ritun Patney,
QoS-aware, fault-tolerant routing in ad-hoc networks, Indian Institute of Technology Delhi
[33] Prof. Dr.-Ing. Jochen Schiller, Mobile Communication,s Summer Term 2002
FU Berlin,Computer Science,Computer Systems & Telematics
[34] Myung Lee & Tarek Saadawi,Classification of Components and Approaches of Ad hoc Routing Protocols, CCNY,October 22nd, 2004
[35] Soumya Roy and J. J. Garcia-Luna-Aceves,Node-Centric Hybrid Routing for Ad-Hoc Wireless Extensions of The Internet, IEEE Globecom 2002
[36] Presenter: Chao Gui,Advisor: Prof. Mohapatra,Efficient Overlay Multicast in
Mobile Ad Hoc Networks,University of California, Davis
[37] G. Pei, M. Gerla, Tsu-Wei Chen, "Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks," IEEE ICC 2000, vol. 1, pp. 70 -74.
[38] Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, and S. Sajama,
Wireless Ad Hoc Networks, Cornell University,School of Electrical and Computer Engineering,323 Rhodes Hall,Ithaca, NY 14853
[39] Haldar Padmaparna , Xuan Chen ,Ns Tutorial 2002, Nov 21, 2002
[40] Dewan Tanvir Ahmed, Multicasting in Ad Hoc Networks, University of Ottawa
[41] Padma Haldar, Wireless world in NS, USC/ISI
[42] K.S. Chan, Reliable QoS Routing in Ad Hoc Networks ,EEE Department
The University of Hong Kong
[43] ثElian altman and Tania Jimenez ,NS Simulator for beginners ,lecture notes 2003-2004,
Univ ,De los andes,Merida ,venezuela
[44] Kevin Fall, The ns Manual,A Collaboration between researchers atUC Berkeley, LBL, USC/ISI, and Xerox PARC, September 10, 2007
[45] Jae Chung and Mark Claypool , NS by Example
[46] http://www.isc.org.ir/
[47] http://nsc.sharif.edu/
[48] http://amn.itrc.ac.ir/
[49] http://nsc.sharif.edu/AMN/
[50] http://cert.ut.ac.ir/fa/index.htm
[51] http://www.websecurity.ir/
[52] http://www.securetarget.net/
[53]http://livesos.mihanblog.com/
[54]http://www.ostadonline.com/COURSES.asp?a=32&p=57
[55]http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/default.asp
[56]http://www.packetstormsecurity.org/papers/general/whitepaper_httpresponse.pdf
[57]http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf
[58]www.ircert.com
[59]http://www.hpl.hp.com/personal/Sung-Ju_Lee/abstracts/focus99.html
[60]http://w3.antd.nist.gov/wctg/manet/manet_bibliog.html
[61]http://www.isr.umd.edu/Courses/Workshops/MANET/program.html
[62]http://bcr2.uwaterloo.ca/~rboutaba/mac_and_routing_interaction_in_ad_hoc_networks.htm
[63]http://www.webspherepower.com/
[64]http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group1/index.html
[65]http://www.faqs.org/rfcs/rfc2501.html
[66]http://adnanbo.blogfa.com/
[67]http://sabait.blogfa.com/
[68]http://www.qomelecom.parsiblog.com/
[69]http://groups.google.co.vi/group/IRAN-Computer
[70]http://www.tebyan.net/index.aspx?pid=479
[71]http://www.ircert.com/articles/articles_index.htm
[72]http://barnamenevis.org/forum/forumdisplay.php?f=49
.