共 27 条
- [1] Alam B, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER NETWORKS (ISCON), P11, DOI 10.1109/ICISCON.2014.6965209
- [2] [Anonymous], 2002, Proc. 4th Middle East. Model. Simulat. MultiConf. (MESM)
- [3] [Anonymous], 2016, P RES DEV MAN C
- [4] Arya KV, 2013, INT CONF IND INF SYS, P477, DOI 10.1109/ICIInfS.2013.6732031
- [5] Bedi P, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1677, DOI 10.1109/ICACCI.2014.6968352
- [7] Issariyakul T., 2009, Processing an NS2 Simulation: Debugging, Tracing, and Result Compilation, P1, DOI [10.1007/978-0-387-71760-9, DOI 10.1007/978-0-387-71760-9, 10.1007/978-0-387-71760-913, DOI 10.1007/978-0-387-71760-913]
- [9] A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 416 - 427
- [10] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972