共 50 条
- [11] Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 925 - 934
- [12] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
- [13] A node quality based clustering algorithm in wireless mobile Ad Hoc networks 5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 174 - 181
- [14] Selfish node detection in ad hoc networks based on fuzzy logic Neural Computing and Applications, 2019, 31 : 6079 - 6090
- [15] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks IEEE ACCESS, 2024, 12 : 95390 - 95401
- [17] Achievable Communication Rates in Ad hoc Wireless Networks Using Local Node Cooperation 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 4052 - 4058
- [18] Secure and Efficient Approach to Prevent Ad hoc Network Attacks using Intrusion Detection System PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 129 - 133
- [19] An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 472 - 479
- [20] TimSim: A Timestep-based Wireless Ad-hoc Network Simulator 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1741 - 1753