共 50 条
[21]
Game-theoretic approach for concurrent transmission in a single-channel for wireless Ad Hoc networks
[J].
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,
2010, 37 (05)
:789-794+800
[22]
An evolutionary approach to routing in wireless ad hoc networks
[J].
IASTED International Conference on Wireless Networks and Emerging Technologies,
2005,
:57-64
[23]
Analysis of Wormhole Attacks in Wireless Sensor Networks
[J].
RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2,
2018, 708
:33-42
[24]
Prevention of Wormhole Attacks in Wireless Sensor Networks
[J].
2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION,
2014,
:287-291
[25]
THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS
[J].
2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM),
2016,
:587-594
[26]
Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution
[J].
2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8,
2009,
:4831-4836
[27]
Immune Inspired Approach for Securing Wireless Ad hoc Networks
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2009, 9 (07)
:206-212
[28]
A novel intrusion detection approach for wireless ad hoc networks
[J].
2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW,
2004,
:831-836
[30]
Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks
[J].
PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017,
2018, 710
:637-642