2007
DOI: 10.3166/ejc.13.105-133
|View full text |Cite
|
Sign up to set email alerts
|

Security and Trust for Wireless Autonomic Networks Systems and Control Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 63 publications
0
9
0
Order By: Relevance
“…The control of the admission is of the new session's user is based on a model of response time. The dynamic approach of adaptation in response times adapts the model to the changes of the characteristics according to the workload and the system requirements so that the system can function automatically, without human intervention [12].…”
Section: Dynamic Adaptation Of the Models In Response Times For The Mmentioning
confidence: 99%
See 1 more Smart Citation
“…The control of the admission is of the new session's user is based on a model of response time. The dynamic approach of adaptation in response times adapts the model to the changes of the characteristics according to the workload and the system requirements so that the system can function automatically, without human intervention [12].…”
Section: Dynamic Adaptation Of the Models In Response Times For The Mmentioning
confidence: 99%
“…The autonomic networks are considered as a solution for the concept of management autonomous the policies make it possible to guide the autonomous elements in terms of objectives to be reached, or service to be returned, load with this one to adapt to the dynamic modification of the rules of policy. To avoid the intervention of the human administrators, the autonomous networks have an automatic characteristic of reflection through well-defined techniques of training but the problems of safety of network (confidence of information, defense, tackles protocols of routing, the dynamic confidence of self-management…) remain stakes [12]. The management of future internet requires the adaptation of autonomous networks to intelligent strategies that provide the technical support for the construction of temporary and highly dynamic networks to meet the human needs for the future ubiquitous and flexible network [13][14][15][16][17].…”
Section: Conclusion and Prospectsmentioning
confidence: 99%
“…There is a large body of literature regarding game theoretical approaches to cyber and network security [1][2][3]16]. Byzantine attacks have their root in the Byzantine generals problem where the traitor generals want to prevent the loyal generals from reaching an agreement [10].…”
Section: Related Workmentioning
confidence: 99%
“…In the last decade or two, this question has been asked in the computer science community from various viewpoints. The result has been the formulation of the notion that two interacting objects or agents can and must establish trust before they can work together to attain whatever common goal they might share [5], [6]. In this paper, we develop this notion in the context of wireless network theory.…”
Section: Introductionmentioning
confidence: 98%