共 50 条
[31]
A Secure Path Selection Scheme for Mobile Ad Hoc Network
[J].
Wireless Personal Communications,
2017, 97
:2087-2096
[32]
Energy Control based Routing for Mobile Ad hoc Network
[J].
2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS,
2009,
:59-62
[33]
Research and implementation of mobile ad hoc network emulation system
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS,
2002,
:749-754
[34]
Detecting and preventing selfish behaviour in mobile ad hoc network
[J].
The Journal of Supercomputing,
2016, 72
:3156-3168
[35]
Transmission power control in the mobile ad hoc network systems
[J].
2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13,
2006,
:368-372
[36]
PKIM:: A public key infrastructure for Mobile ad hoc network
[J].
CHINESE JOURNAL OF ELECTRONICS,
2005, 14 (04)
:594-598
[37]
A novel approach for intrusion detection in mobile ad hoc networks
[J].
Int. J. Networking Virtual Organ.,
2019, 3 (363-378)
:363-378
[38]
Achievable Throughput-Based Admission Control for Mobile Ad Hoc Network: Cross Layer Approach
[J].
Wireless Personal Communications,
2015, 84
:2777-2796
[40]
A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network
[J].
Wireless Personal Communications,
2020, 113
:2141-2166