共 50 条
- [1] Detection of malicious node using Improved CONFIDANT Technique in Ad-hoc Networks PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 604 - 610
- [2] Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT III, 2022, 13473 : 249 - 260
- [4] The impact of malicious nodes on the performance of wireless Ad-hoc networks MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 596 - +
- [5] Identifying Malicious Nodes in Mobile Ad-Hoc Networks using Polynomial Reduction Algorithm 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1179 - 1184
- [7] Utilizing behaviour history to right malicious nodes in wireless Ad-hoc networks INFORMATION MANAGEMENT IN THE NETWORKED ECONOMY: ISSUES & SOLUTIONS, 2007, : 81 - 87
- [9] Securing ad-hoc networks using IPSec MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2948 - 2953
- [10] A partition detection system for mobile ad-hoc networks 2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, : 489 - 497