共 25 条
[1]
BRUTCH P, 2003, IEEE WORKSH SEC ASS
[2]
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
[4]
Hu JY, 2009, COMPUT COMMUN NETW S, P43, DOI 10.1007/978-1-84800-328-6_3
[5]
Jacquet P, 2001, IEEE INMIC 2001: IEEE INTERNATIONAL MULTI TOPIC CONFERENCE 2001, PROCEEDINGS, P62, DOI 10.1109/INMIC.2001.995315
[6]
Karchirski O., 2003, P 36 IEEE INT C SYST, P244
[7]
Detecting critical nodes for MANET Intrusion Detection Systems
[J].
SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS,
2006,
:7-+
[8]
Pathan K., 2009, ROUTING MOBILE AD HO, P63
[9]
PERKINS C, 2000, AD HOC ON DEMAND DIS
[10]
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
[J].
Computer Communications Review,
1994, 24 (04)