共 14 条
- [1] Abdelhaq Maha, 2011, International Journal of New Computer Architectures and their Applications, V1, P534
- [2] Alattar M., 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P237, DOI 10.1109/ICDCSW.2012.27
- [3] Gandhewar N., 2012, 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012), P714, DOI 10.1109/CICN.2012.96
- [4] Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 530 - +
- [5] Kandah Farah, 2011, COMP COMM WORKSH INF
- [6] Kannhavong B., 2006, GLOB TEL C 2006 GLOB, p[1, 5]
- [7] Kumar Sushant, 2010, P 2010 ACM WORKSH WI, V1
- [8] Madhurikkha S, 2013, 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), P260, DOI 10.1109/ICICES.2013.6508229
- [9] Mohil Nitin, 2014, INT J RES ADVENT TEC, V2
- [10] Sadeghi M., 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN 2012), P301, DOI 10.1109/ICUFN.2012.6261716