共 50 条
[41]
Integration wireless security with networking routing in ad hoc sensor networks
[J].
5TH WORLD WIRELESS CONGRESS, PROCEEDINGS,
2004,
:631-636
[42]
Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks
[J].
EVOLUTIONARY AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS IV,
2010, 7704
[43]
Trust establishment in ad hoc and sensor networks
[J].
CRITICAL INFORMATION INFRASTRUCTURES SECURITY,
2006, 4347
:179-+
[44]
Cross-layer designs for mitigating range attacks in ad hoc networks
[J].
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS,
2006,
:64-69
[46]
A trust enhanced secure clustering framework for wireless ad hoc networks
[J].
Wireless Networks,
2014, 20
:1669-1684
[48]
Energy Saving Dynamic Source Routing for ad hoc wireless networks
[J].
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS,
2005,
:305-310
[49]
Prevention of cooperative black hole attack in wireless ad hoc networks
[J].
ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS,
2003,
:570-575
[50]
Wireless ad hoc networks and related topologies: applications and research challenges
[J].
ELEKTROTECHNIK UND INFORMATIONSTECHNIK,
2006, 123 (06)
:232-241