Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation‐Based Coalition Game

A Al Sharah, T Oyedare, S Shetty - Journal of Computer …, 2016 - Wiley Online Library
Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries
to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent …

Cyber maneuvers and maneuver keys

D Torrieri - 2014 IEEE Military Communications Conference, 2014 - ieeexplore.ieee.org
This paper presents an overview of cyber maneuvers and their roles in cyber security. As the
cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such …

Adversarial dynamics: the conficker case study

D Bilar, G Cybenko, J Murphy - Moving Target Defense II: Application of …, 2012 - Springer
It is well known that computer and network security is an adversarial challenge. Attackers
develop exploits and defenders respond to them through updates, service packs or other …

Self-healing wireless networks under insider jamming attacks

L Li, S Zhu, D Torrieri, S Jajodia - 2014 IEEE Conference on …, 2014 - ieeexplore.ieee.org
As jamming is a very serious threat to the normal operation of wireless networks, recently
much research has been done to deal with it. Different from most existing research, In this …

Cyber maneuver against external adversaries and compromised nodes

D Torrieri, S Zhu, S Jajodia - Moving Target Defense II: Application of …, 2012 - Springer
This article identifies the research issues and challenges from jamming and other attacks by
external sources and insiders. Based on the spirit of cyber maneuver, it proposes a general …