MILCOM 2012 - 2012 IEEE Military Communications Conference 2012
DOI: 10.1109/milcom.2012.6415746
|View full text |Cite
|
Sign up to set email alerts
|

Survivability prediction of ad hoc networks under attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…evaluation of mobile ad-hoc networks under attack [39] and analyzing secure content in manets [40] were done by using network emulation in CORE [11], a lightweight mobile ad-hoc network emulator based on IMUNES.…”
Section: Related Workmentioning
confidence: 99%
“…evaluation of mobile ad-hoc networks under attack [39] and analyzing secure content in manets [40] were done by using network emulation in CORE [11], a lightweight mobile ad-hoc network emulator based on IMUNES.…”
Section: Related Workmentioning
confidence: 99%
“…Work in [1] describes a novel analysis methodology that uses log data from several emulation executions to generate models. These models can be used to develop accurate simulations, quicklook attack impact analysis, decision support, and others.…”
Section: Execution-based Model Generationmentioning
confidence: 99%
“…Another feature of the analysis component is a model quality estimator that will provide an indication of the potential quality of a model that would result from the model generation component. This estimate will be based on the similarity of data resulting from similar scenario executions (we will use the conflict detector algorithm from [1]). …”
Section: Sedapmentioning
confidence: 99%