共 16 条
- [1] [Anonymous], 2018, 2018 INT C SOFT COMP
- [3] Bhosle Amol, 2013, INT J EMERGING TECHN, V3
- [4] Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 137 - 150
- [5] Kumar A, 2012, 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P854, DOI 10.1109/PDGC.2012.6449935
- [8] Shen Xuemin Sherman, 2014, LIGHTWEIGHT ENCRYPTI
- [10] Shushan Zhao, 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), P96, DOI 10.1109/PST.2012.6297925