共 20 条
[1]
Appiah M, 2016, 2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016), P208, DOI 10.1109/ICACCE.2016.8073749
[2]
Appiah M, 2017, 2017 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING APPLICATIONS (NEXTCOMP), P47, DOI 10.1109/NEXTCOMP.2017.8016175
[3]
Fuzzy Based Detection of Malicious Activity for Security Assessment of MANET
[J].
NATIONAL ACADEMY SCIENCE LETTERS-INDIA,
2018, 41 (01)
:23-28
[5]
Two novel trust evaluation algorithms
[J].
2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING,
2006,
:1641-+
[6]
Hoebeke J, 2004, J COMMUN NETW-UK, V3, P60
[7]
Hui Xia, 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications, P124, DOI 10.1109/GreenCom.2011.30
[8]
Kalpana Devi M., 2020, INT J INTELLIGENT NE, V1, P67, DOI [10.1016/j.ijin.2020.07.002, DOI 10.1016/J.IJIN.2020.07.002]