共 25 条
- [1] Al Mazrouei M. Salem, 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P308
- [2] Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
- [3] [Anonymous], 2009, INT COMPUT SCI
- [4] [Anonymous], 2010, International Journal of Computer Applications, DOI DOI 10.5120/445-679
- [6] Performance Analysis of MANET under Blackhole Attack [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 141 - +
- [7] Bhattacharya R, 1997, PIMRC '97 - EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS: WAVES OF THE YEAR 2000+, TECHNICAL PROGRAM, PROCEEDINGS, VOLS 1-3, P877, DOI 10.1109/PIMRC.1997.627012
- [8] Bo Sun, 2003, 5th European Personal Mobile Communications Conference 2003 (IEE Conf. Publ. 492), P490, DOI 10.1049/cp:20030303
- [9] Christos P., 2009, INT C COMM MOB COMP, P22
- [10] Fall K., 2003, NS MANUAL FORMERLY N