Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("misbehavior")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 19 of 19

  • Page / 1
Export

Selection :

  • and

An acknowledgment-based approach for the detection of routing misbehavior in MANETsKEJUN LIU; JING DENG; VARSHNEY, Pramod K et al.IEEE transactions on mobile computing. 2007, Vol 6, Num 5, pp 536-550, issn 1536-1233, 15 p.Article

A Safe Haven for Misbehaving? : An Investigation of Online Misbehavior Among University StudentsSELWYN, Neil.Social science computer review. 2008, Vol 26, Num 4, pp 446-465, issn 0894-4393, 20 p.Article

Misbehavior Detection Algorithm in CCSDS Space Telecommand SystemLEI ZHANG; CHENGJIN AN; QUAN ZHANG et al.IEEE communications letters. 2010, Vol 14, Num 8, pp 746-748, issn 1089-7798, 3 p.Article

Universal Non-Linear Cheat-Proof Pricing Framework for Wireless Multiple Access ChannelsFEI SHEN; JORSWIECK, Eduard.IEEE transactions on wireless communications. 2014, Vol 13, Num 3, pp 1436-1448, issn 1536-1276, 13 p.Article

Ecology of Cognitive Radio Ad Hoc NetworksCHENG, Shin-Ming; CHEN, Pin-Yu; CHEN, Kwang-Cheng et al.IEEE communications letters. 2011, Vol 15, Num 7, pp 764-766, issn 1089-7798, 3 p.Article

The Dark Side of Rapport: Agent Misbehavior Face-to-Face and OnlineJAP, Sandy; ROBERTSON, Diana C; HAMILTON, Ryan et al.Management science. 2011, Vol 57, Num 9, pp 1610-1622, issn 0025-1909, 13 p.Article

An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networksSARAFIJANOVIC, Slavisa; LE BOUDEC, Jean-Yves.IEEE transactions on neural networks. 2005, Vol 16, Num 5, pp 1076-1087, issn 1045-9227, 12 p.Article

The Impact of Teachers' Aggressive Management Techniques on Students' Attitudes to SchoolworkROMI, Shlomo; LEWIS, Ramon; ROACHE, Joel et al.The Journal of educational research (Washington, DC). 2011, Vol 104, Num 4, pp 231-240, issn 0022-0671, 10 p.Article

SeCA: A framework for Secure Channel Assignment in wireless mesh networksKIM, Mihui; PENG NING.Computer communications. 2011, Vol 34, Num 4, pp 567-576, issn 0140-3664, 10 p.Article

Complementary roles of care and behavioral control in classroom management: The self-determination theory perspectiveYOUYAN NIE; SHUN LAU.Contemporary educational psychology. 2009, Vol 34, Num 3, pp 185-194, issn 0361-476X, 10 p.Article

The relationship between social behavior and emergent literacy among preschool boys and girlsDOCTOROFF, Greta L; GREER, Joseph A; ARNOLD, David H et al.Journal of applied developmental psychology. 2006, Vol 27, Num 1, pp 1-13, issn 0193-3973, 13 p.Article

Risk in the face of retribution: Psychopathic individuals persist in financial misbehavior among the Dark TriadJONES, Daniel N.Personality and individual differences. 2014, Vol 67, pp 109-113, issn 0191-8869, 5 p.Article

Reading between the lines: Implicit assessment of the association of parental attributions and empathy with abuse riskRODRIGUEZ, Christina M; COOK, Anne E; JEDRZIEWSKI, Chezlie T et al.Child abuse & neglect. 2012, Vol 36, Num 7-8, pp 564-571, issn 0145-2134, 8 p.Article

MAP Detection of Misbehaving Relay in Wireless Multiple Access Relay NetworksSANG WU KIM; KHALAF, Taha; KIM, Sangmun et al.IEEE communications letters. 2011, Vol 15, Num 3, pp 340-342, issn 1089-7798, 3 p.Article

Identifying and Addressing Mental Health Risks and Problems in Primary Care Pediatric Settings: A Model to Promote Developmental and Cultural CompetenceGODOY, Leandra; CARTER, Alice S.American journal of orthopsychiatry. 2013, Vol 83, Num 1, pp 73-88, issn 0002-9432, 16 p.Article

Enhancing IEEE 802.11 Random Backoff in Selfish EnvironmentsLEI GUANG; ASSI, Chadi M; BENSLIMANE, Abderrahim et al.IEEE transactions on vehicular technology. 2008, Vol 57, Num 3, pp 1806-1822, issn 0018-9545, 17 p.Article

Receiver-centric congestion control with a misbehaving receiver : Vulnerabilities and end-point solutionsKUZMANOVIC, A; KNIGHTLY, E. W.Computer networks (1999). 2007, Vol 51, Num 10, pp 2717-2737, issn 1389-1286, 21 p.Article

Struggling against selfishness and black hole attacks in MANETsDJENOURI, Djamel; BADACHE, Nadjib.Wireless communications and mobile computing (Print). 2008, Vol 8, Num 6, pp 689-704, issn 1530-8669, 16 p.Article

A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks : DEVELOPMENTS IN SECURITY AND PRIVACY-PRESERVING MECHANISMS FOR FUTURE MOBILE COMMUNICATION NETWORKSMORAIS, Anderson; CAVALLI, Ana.Journal on special topics in mobile networks and applications. 2014, Vol 19, Num 1, pp 101-120, issn 1383-469X, 20 p.Article

  • Page / 1