共 44 条
[1]
Ahila S. S., 2014, INT C INF COMM EMB S, P1
[2]
Al-Anni M. K., 2017, INT J COMPUT INF SCI, V11, P801
[3]
Anil A., 2014, INT J RES ENG TECHNO, V3, P16
[4]
[Anonymous], 2016, CIRCUITS SYSTEMS
[5]
A new trust-based mechanism for detecting intrusions in MANET
[J].
Information Security Journal,
2017, 26 (04)
:153-165
[6]
Bagga P., 2017, J ACM COMPUTING SURV, V50, P1
[7]
Budhkar S., 2012, Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology (RAIT 2012), P124, DOI 10.1109/RAIT.2012.6194492
[8]
Chowdhury C., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P990, DOI 10.1109/WICT.2011.6141383
[9]
Chowdhury Chandreyee, 2010, Proceedings of the Third International Conference on Dependability (DEPEND 2010), P45, DOI 10.1109/DEPEND.2010.15
[10]
Chowdhury C., 2011, INT J ADV NETWORKS S, V4, P55