共 14 条
- [1] Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
- [2] [Anonymous], 2009, TAODV TRUSTED AODV R
- [3] Chlamtac Imrich., 2003, Ad Hoc Networks, V1, P13, DOI DOI 10.1016/S1570-8705(03)00013-1
- [4] Performance analysis of ad-hoc networks under black hole attacks [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 148 - 153
- [5] Jain Ankit, 2010, J GLOBAL RES COMPUTE, V10
- [6] Jassim Hothefa Sh., 2009, IEEE 9 MAL INT C COM
- [7] Mangrulkar R. S., 2010, INT J COMPUTER APPL, V7
- [8] Mekaetal Kamal Deep, 2006, P 2 SEC KNOWL MAN WO
- [9] Menaka A., 2009, TRUST BASED SECURE R
- [10] Perkins C., 2003, AD HOC ON DEMAND DIS