|
Alajmi, N., & Elleithy, K. (2015). Multi-Layer Approach for the Detection of Selective Forwarding Attacks. Sensors, 15(11), 29332-29345. Andoni, A., & Indyk, P. (2006). Near-optimal hashing algorithms for near neighbor problem in high dimensions. Paper presented at the Proceedings of the Symposium on the Foundations of Computer Science. Belen, R. (2009). Detecting disguised missing data. MIDDLE EAST TECHNICAL UNIVERSITY. Bianchi, S., Felber, P., & Gradinariu, M. (2007). Content-based publish/subscribe using distributed r-trees. Paper presented at the European Conference on Parallel Processing. Bilal, D. (2012). Ranking, relevance judgment, and precision of information retrieval on children's queries: Evaluation of Google, Yahoo!, Bing, Yahoo! Kids, and ask Kids. Journal of the Association for Information Science and Technology, 63(9), 1879-1896. Broder, A. Z., Charikar, M., Frieze, A. M., & Mitzenmacher, M. (1998). Min-wise independent permutations. Paper presented at the Proceedings of the thirtieth annual ACM symposium on Theory of computing. Brownlee, K. A., & Brownlee, K. A. (1965). Statistical theory and methodology in science and engineering (Vol. 150): Wiley New York. Busse, M., Haenselmann, T., & Effelsberg, W. (2006). Energy-efficient forwarding schemes for wireless sensor networks. Paper presented at the Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks. Chen, X., Shen, J., Groves, T., & Wu, J. (2009). Probability delegation forwarding in delay tolerant networks. Paper presented at the Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on. Clarke, I., Sandberg, O., Wiley, B., & Hong, T. W. (2001). Freenet: A distributed anonymous information storage and retrieval system. Paper presented at the Designing Privacy Enhancing Technologies. Condie, T., Kamvar, S. D., & Garcia-Molina, H. (2004). Adaptive peer-to-peer topologies. Paper presented at the Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on. Deering, S. E., & Cheriton, D. R. (1990). Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems (TOCS), 8(2), 85-110. Demirbas, M., Lu, X., & Singla, P. (2009). An in-network querying framework for wireless sensor networks. IEEE transactions on parallel and distributed systems, 20(8), 1202-1215. Deng, H., Sun, X., Wang, B., & Cao, Y. (2009). Selective forwarding attack detection using watermark in WSNs. Paper presented at the 2009 ISECS International Colloquium on Computing, Communication, Control, and Management. Erramilli, V., Crovella, M., Chaintreau, A., & Diot, C. (2008). Delegation forwarding. Paper presented at the Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing. Fan, K.-W., Liu, S., & Sinha, P. (2008). Dynamic forwarding over tree-on-dag for scalable data aggregation in sensor networks. IEEE Transactions on Mobile Computing, 7(10), 1271-1284. Farley, A. M. (1979). Minimal broadcast networks. Networks, 9(4), 313-332. Farley, A. M. (1980). Broadcast time in communication networks. SIAM Journal on Applied Mathematics, 39(2), 385-390. Feller, W. (1968). An introduction to probability theory and its applications: volume I (Vol. 3): John Wiley & Sons London-New York-Sydney-Toronto. Ferreira, R. A., Ramanathan, M. K., Awan, A., Grama, A., & Jagannathan, S. (2005). Search with probabilistic guarantees in unstructured peer-to-peer networks. Paper presented at the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05). Frey, H., & Stojmenovic, I. (2010). On delivery guarantees and worst-case forwarding bounds of elementary face routing components in ad hoc and sensor networks. IEEE Transactions on Computers, 59(9), 1224-1238. Geethu, P., & Mohammed, A. R. (2013). Defense mechanism against selective forwarding attack in wireless sensor networks. Paper presented at the Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. Ghosh, A. K., & Schwartzbard, A. (1999). A Study in Using Neural Networks for Anomaly and Misuse Detection. Paper presented at the USENIX Security. Goonatilake, R., Herath, A., Herath, S., Herath, S., & Herath, J. (2007). Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security. Journal of Computing Sciences in Colleges, 23(1), 255-263. Gu, Y., & He, T. (2007). Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links. Paper presented at the Proceedings of the 5th international conference on Embedded networked sensor systems. Gupta, A., Sahin, O. D., Agrawal, D., & Abbadi, A. E. (2004). Meghdoot: content-based publish/subscribe over P2P networks. Paper presented at the Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware. Haas, Z. J., Halpern, J. Y., & Li, L. (2006). Gossip-based ad hoc routing. IEEE/ACM Transactions on Networking (ToN), 14(3), 479-491. Hai, T. H., & Huh, E.-N. (2008). Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. Paper presented at the Network Computing and Applications, 2008. NCA'08. Seventh IEEE International Symposium on. Hales, D. (2004). From selfish nodes to cooperative networks-emergent link-based incentives in peer-to-peer networks. Paper presented at the Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on. Hedetniemi, S. M., Hedetniemi, S. T., & Liestman, A. L. (1988). A survey of gossiping and broadcasting in communication networks. Networks, 18(4), 319-349. Helman, P., & Bhangoo, J. (1997). A statistically based system for prioritizing information exploration under uncertainty. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 27(4), 449-466. Herrmann, M., Zhang, R., Ning, K.-C., Diaz, C., & Preneel, B. (2014). Censorship-resistant and privacy-preserving distributed web search. Paper presented at the Peer-to-Peer Computing (P2P), 14-th IEEE International Conference on. Ho, J. C., Zhang, Q., & Lee, C.-S. (2011). Google's retreat from China: Two competing theories. Paper presented at the Technology Management in the Energy Smart World (PICMET), 2011 Proceedings of PICMET'11:. Isdal, T., Piatek, M., Krishnamurthy, A., & Anderson, T. (2010). Privacy-preserving p2p data sharing with oneswarm. Paper presented at the ACM SIGCOMM Computer Communication Review. Jesi, G. P., Hales, D., & Van Steen, M. (2007). Identifying malicious peers before it's too late: a decentralized secure peer sampling service. Paper presented at the First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007). Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), 293-315. Khosrow-Pour, M. (2008). Encyclopedia of information science and technology (Vol. 1): IGI Global. Lazarevic, A., Ertöz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. Paper presented at the SDM. Lee, H. Y., & Cho, T. H. (2007). Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks. Paper presented at the International Conference on Ubiquitous Intelligence and Computing. Lee, W., & Stolfo, S. J. (1998). Data Mining Approaches for Intrusion Detection. Paper presented at the Usenix security. Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets: Cambridge University Press. Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets: Cambridge University Press. Li, J., Jannotti, J., De Couto, D. S., Karger, D. R., & Morris, R. (2000). A scalable location service for geographic ad hoc routing. Paper presented at the Proceedings of the 6th annual international conference on Mobile computing and networking. Lotfinezhad, M., Liang, B., & Sousa, E. S. (2008). Adaptive cluster-based data collection in sensor networks with direct sink access. IEEE Transactions on Mobile Computing, 7(7), 884-897. Mathur, A., Newe, T., & Rao, M. (2016). Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT. Sensors, 16(1), 118. Melliar-Smith, P. M., Moser, L. E., Lombera, I. M., & Chuang, Y.-T. (2012). iTrust: Trustworthy information publication, search and retrieval. Paper presented at the International Conference on Distributed Computing and Networking. Mischke, J., & Stiller, B. (2004). A methodology for the design of distributed search in P2P middleware. IEEE network, 18(1), 30-37. Morselli, R., Bhattacharjee, B., Marsh, M. A., & Srinivasan, A. (2007). Efficient lookup on unstructured topologies. IEEE Journal on selected areas in communications, 25(1), 62-72. Moser, L. E., & Melliar-Smith, P. (2013). Probabilistic analysis of message forwarding. Paper presented at the 2013 22nd International Conference on Computer Communication and Networks (ICCCN). Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. 2070-1721). Press, W. H. (2007). Numerical recipes 3rd edition: The art of scientific computing: Cambridge university press. Ratnasamy, S., Karp, B., Shenker, S., Estrin, D., Govindan, R., Yin, L., et al. (2003). Data-centric storage in sensornets with GHT, a geographic hash table. Mobile networks and applications, 8(4), 427-442. Risson, J., & Moors, T. (2006). Survey of research towards robust peer-to-peer networks: search methods. Computer networks, 50(17), 3485-3521. Roberts, S. (2000). Control chart tests based on geometric moving averages. Technometrics, 42(1), 97-101. Sasson, Y., Cavin, D., & Schiper, A. (2003). Probabilistic broadcast for flooding in wireless mobile ad hoc networks. Paper presented at the Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE. Shah, N., & Qian, D. (2011). An efficient unstructured p2p overlay over manet using underlying proactive routing. Paper presented at the Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on. Sharma, P., Souza, D., Fiore, E., Gottschalk, J., & Marquis, D. (2012). A case for MANET-aware content centric networking of smartphones. Paper presented at the World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a. Shen, H., Li, Z., & Chen, K. (2014). A scalable and mobility-resilient data search system for large-scale mobile wireless networks. IEEE transactions on parallel and distributed systems, 25(5), 1124-1134. Shen, H., Zhao, L., & Li, Z. (2011). A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Transactions on Mobile Computing, 10(7), 982-996. Terpstra, W. W., Kangasharju, J., Leng, C., & Buchmann, A. P. (2007). Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search. Paper presented at the ACM SIGCOMM Computer Communication Review. Tran, D. A., & Pham, C. (2010). Enabling content-based publish/subscribe services in cooperative P2P networks. Computer Networks, 54(11), 1739-1749. Tsoumakos, D., & Roussopoulos, N. (2003). A Comparison of Peer-to-Peer Search Methods. Paper presented at the WebDB. Viinikka, J., & Debar, H. (2004). Monitoring IDS background noise using EWMA control charts and alert information. Paper presented at the International Workshop on Recent Advances in Intrusion Detection. Wong, B., & Guha, S. (2008). Quasar: a probabilistic publish-subscribe system for social networks. Paper presented at the IPTPS. Xiao, B., Yu, B., & Gao, C. (2007). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), 1218-1230. Xing, G., Li, M., Luo, H., & Jia, X. (2009). Dynamic multiresolution data dissemination in wireless sensor networks. IEEE Transactions on Mobile Computing, 8(9), 1205-1220. Xin-Sheng, W., Yong-zhao, Z., Shu-ming, X., & Liang-min, W. (2009). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. Paper presented at the Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC'09. International Conference on. Xu, B. (2014). Media censorship in China. Council on Foreign Relations, 25. Xu, J., Tang, X., & Lee, W.-C. (2008). A new storage scheme for approximate location queries in object-tracking sensor networks. IEEE transactions on parallel and distributed systems, 19(2), 262-275. Yang, H., Ye, F., & Sikdar, B. (2008). A swarm-intelligence-based protocol for data acquisition in networks with mobile sinks. IEEE Transactions on Mobile Computing, 7(8), 931-945. Ye, N., & Chen, Q. (2001). An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International, 17(2), 105-112. Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. Paper presented at the Proceedings 20th IEEE International Parallel & Distributed Processing Symposium. Zhou, B., Shi, Q., & Merabti, M. (2006). Intrusion detection in pervasive networks based on a chi-square statistic test. Paper presented at the 30th Annual International Computer Software and Applications Conference (COMPSAC'06). Zuo, M., Zhang, X., & Liu, Q. (2008). The Development of Search Engine in China and its Problems Revealed in Net Information Retrieval. Paper presented at the Information Processing (ISIP), 2008 International Symposiums on. 財團法人台灣網路資訊中心(民105)。 2016 年台灣寬頻網路使用調查報告。民105年1月,取自:財團法人台灣網路資訊中心網站:http://www.twnic.net.tw/download/download_01.htm
|