共 50 条
- [1] THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 587 - 594
- [2] JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 432 - +
- [6] Simulations in wireless sensor and ad hoc networks Int. Conf. Mob. Comput. Netw. Co-Located Workshops Proc. First ACM Workshops Sens. Actor Netw., 2007, (1-2): : 1 - 2
- [7] Power Draining Prevention In Ad-Hoc Sensor Networks Using Sensor Network Encryption Protocol 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
- [8] Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach 2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1193 - 1199
- [10] Link life based routing protocol for Ad Hoc wireless networks TENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2001, : 573 - 576