[1] Lamport L, Shostak R, Pease M. The Byzantine general problems //Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
[2] Hu, Perrig A, Johnson B, et al. Rushing attacksand defense in wireless ad hoc network routing protocols //ACM Workshop on Wireless Security (WiSe). 2003.
[3] Sharma S, Gupta R. Simultion study of blackhole attack in the mobile Ad Hoc network [J].Journal of Engineering Science and Technology, 2009, 4(2):243-250.
[4] Baras J, Radosavac S, Theodorakopoulos G. Intrusion detection system resiliency to Byzantine attacks:the case study of wormholes in OLSR . U S Army Research Laboratory under the Collaborative Technology Alliance Program, 2008.
[5] Awerbuch B, Curtmola R, Holmer D, et al. ODSBR: an on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks [J]. ACM Transactions on Information and System Security,2008,10(4):27-31.
[6] Newsome J, Song D, Perrig A, et al. The sybil attack in sensor networks: analysis & defenses // ACM. Berkeley, California, USA. 2004:26-27.
[7] Feng T, Ma J F.New approach against Sybil attack in wireless sensor hetworks [J].Journal on Communications, 2008,29(6):13-19(in Chinese). 冯涛, 马建峰. 防御无线传感器网络Sybil 攻击的新方法 [J]. 通信学报, 2008,29(6):13-19.
[8] Undercoffer J, Joshi A, Pinkston J. Modeling computer attacks: an ontology for intrusion detection //Berlin, Heidelberg:Springer-Verlag,2003:131-135.
[9] Abdoli F, Meibody N, Bazoubandi R. An attacks ontology for computer and networks attack [J].Innovations and Advances in Computer Sciences and Engineering, 2010: 473-476.
[10] Liu F H, Lee W T. Constructing enterprise information network security risk management mechanism by ontology [J]. Tamkang Journal of Science and Engineering, 2010,13(1):79-87.
[11] Benali F, Legrand V, Ubéda S. An ontology for the management of heteregenous alerts of information system // 2007 International Conference on Security and Management (SAM’07). Las Vegas, USA, 2007.
[12] Perez A G, Benjamins V R. Overview of knowledge sharing and reuse components. ontologies and problem-solving methods // Proceedings of the IJCAI299 Workshop on Ontologies and Problem-Solving Methods (KRR5). 1999:1-15.
[13] Studer R, Benjamins V R, Fensel D. Knowledge engineering,principles and methods [J]. Data and Knowledge Engineering, 1998: 161-197.
[14] Fikes R, McGuinness D L. An axiomatic semantics for RDF, RDFS, Owl .(2008) http://www.w3.org/TR/daml+oil-axioms.
[15] Awerbuch B, Curtmola R, Holmer D, et al. On the survivability of routing protocols in ad hoc wireless networks // Proc of Secure Comm IEEE. 2005.
[16] Awerbuch B, Curtmola R, Holmer D, et al. Mitigating Byzantine attacks in Ad Hoc wireless networks: technical report . Department of Computer Science, Purdue University. 2004.
[17] Rule ML Homepage (2010) http://www.ruleml.org/.
|