Peter C. Mason

According to our database1, Peter C. Mason authored at least 27 papers between 2007 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
HMS: Holistic MPR selection and network connectivity for tactical edge networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning.
IEEE Trans. Veh. Technol., 2014

Simulation implementation and performance analysis for situational awareness data dissemination in a tactical manet.
Proceedings of the 2014 Winter Simulation Conference, 2014

Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Trust establishment with data fusion for secure routing in MANETs.
Proceedings of the IEEE International Conference on Communications, 2014

Detection of side-channel communication in ad hoc networks using request to send (RTS) messages.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
Cross-Layer Security Management Framework for Mobile Tactical Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Searching for Black Holes in Subways.
Theory Comput. Syst., 2012

Joint authentication and quality of service provisioning in cooperative communication networks.
Comput. Commun., 2012

Fault-Tolerant Exploration of an Unknown Dangerous Graph by Scattered Agents.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Using covert timing channels for attack detection in MANETs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Joint replay detection in tactical networks.
Proceedings of IEEE International Conference on Communications, 2012

Finding Good Coffee in Paris.
Proceedings of the Fun with Algorithms - 6th International Conference, 2012

2011
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios
CoRR, 2011

Enhancement of frequency-based wormhole attack detection.
Proceedings of the MILCOM 2011, 2011

Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System.
Proceedings of IEEE International Conference on Communications, 2011

2010
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2010

A modular security architecture for managing security associations in MANETs.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Mapping an Unfriendly Subway System.
Proceedings of the Fun with Algorithms, 5th International Conference, 2010

Combined Authentication and Quality of Service in Cooperative Communication Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
On Trust Evaluation in Mobile Ad Hoc Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

A frame handler module for a side-channel in mobile ad hoc networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Map construction and exploration by mobile agents scattered in a dangerous network.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Analysis of Chinese Remainder Theorem Based Group Key Management Protocols.
Proceedings of the 2009 International Conference on Security & Management, 2009

2007
Enhancing frequency-based wormhole attack detection with novel jitter waveforms.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007


  Loading...