KYASANUR P, VAIDYA N. Detection and handling of MAC layer misbehavior in wireless networks[C]// Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN’03). San Francisco: IEEE Press, 2003: 173-183.
[2]
CAGALJ M, GANERIWAL S, AAD I, et al. On selfish behavior in CSMA/CA networks[C]//Proceedings of IEEE Infocom on 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami:IEEE Press, 2005: 2513-2524.
[3]
RADOSAVAC S, BARAS J S, KOUTSOPOULOS I. A framework for MAC protocol misbehavior detection in wireless networks[C]//Proceedings of the 4th ACM Workshop on Wireless Security. Cologne: ACM Press, 2005: 33-42.
[4]
TOLEDO L, WANG X. Robust detection of selfish misbehavior in wireless network [J]. IEEE Journal on Selected Areas in Communications, 2007, 25(6): 1124-1134.
[5]
刘春风.IEEE802.11无线ad hoc网络MAC层自私行为研究 [D]. 天津:天津大学, 2008: 45-55. LIU Chunfeng. Study of selfish behavior on MAC layer of wireless Ad Hoc networks[D]. Tianjin :Tianjin University, 2008:45-55.
[6]
冷?鹏,李勇,刘科.无线共享信道退避访问攻击的新型检测算法 [J].电子科技大学学报, 2009, 38(5): 644-650. LENG Supeng, LI Yong, LIU Ke. Novel detection scheme for backoff attacks on the shared wireless channel [J].Journal of University of Electronic Science and Technology of China, 2009, 38(5) : 644-650.
[7]
RAYA M, HUBAUX J P, AAD I. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots [C]// Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services. Boston: ACM Press, 2004: 84-97.
[8]
AICKELIN U, BENTLEY P, CAYZER S, et al. Danger theory: the link between ais and ids [C]// Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03). Edinburgh: Springer Press, 2003:147-155.
[9]
AZZEDINE B, RENATO B M, KATHIA R L, et al. An agent based and biological inspired real-time intrusion detection and security model for computer network operations [J]. Computer Communications, 2007, 30(13): 2649-2660.
[10]
GONG Maoguo, JIAO Licheng, ZHANG Lining. Baldwinian learning in clonal selection algorithm for optimization [J]. Information Sciences: an International Journal, 2010, 180(8): 1218-1236.
[11]
WU Xiaonan, BANZHAF W. Review: the use of computational intelligence in intrusion detection systems [J].Applied Soft Computing, 2010, 10 (1): 1-35.
[12]
CHATZIMISIOS P, VITSAS V, BOUCOUVALAS A C. Throughput and delay analysis of the IEEE 802.11 protocol [C]// Proceedings of the 5th IEEE International Workshop on Network Appliances (IWNA’02). Liverpool: IEEE Press, 2002: 168-174.
[13]
ZHAO Yi, TSUNG Fugee, WANG Zhaojun. Dual DCUSUM control scheme for detecting a range of mean shift [J]. IIE Transactions, 2005, 37(11), 1047-1058.