共 14 条
[1]
Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496
[2]
Elshazly K., 2014, J COMPUTER COMMUNICA, P5
[3]
Gupta Himanshu, 2013, International Journal of Computer Theory and Engineering, V5, P638, DOI 10.7763/IJCTE.2013.V5.765
[4]
Gupta H., 2011, International Journal of Network Security Its Applications, V3, P89, DOI [10.5121/ijnsa.2011.3606, DOI 10.5121/IJNSA.2011.3606]
[5]
Halfond W.G, 2006, P IEEE INT S SEC SOF, P13
[6]
Marco Cova, 2007, RECENT ADV INTRUSION, V4637, P63
[7]
Mihir Gandhi, 2013, INT J SOFT COMPUTING, V2, P1
[8]
Singh A., 2015, IEEE T VEH TECHNOL, P1, DOI [10.1109/INDICON.2015.7443310, DOI 10.1017/S1759078715000446]
[9]
Singh Ajay Vikram, 2011, International Journal of Research and Reviews in Ad Hoc Networks, V1, P73
[10]
Som S., 2011, 2011 7th International Conference on Information Assurance and Security (IAS), P240, DOI 10.1109/ISIAS.2011.6122826