共 19 条
[1]
Li W.(2012)Security through collaboration and trust in manets Mobile Networks and Applications (MONET) 17 342-352
[2]
Parker J.(2005)Self-policing mobile ad hoc networks by reputation systems IEEE Communications Magazine 43 101-107
[3]
Joshi A.(1999)Securing ad hoc networks IEEE Network 13 24-30
[4]
Buchegger S.(2004)Providing fault-tolerant ad hoc routing service in adversarial environments Wirel. Pers. Commun. 29 367-388
[5]
Le Boudee J.-Y.(1994)Policy driven management for distributed systems Journal of Network and Systems Management 2 333-360
[6]
Zhou L.(2007)Secure and efficient key management in mobile ad hoc networks Journal of Network and Computer Applications 30 937-954
[7]
Haas Z.(1969)Procedures for detecting outlying observations in samples Technometrics 11 1-21
[8]
Xue Y.(1998)Glomosim: a library for parallel simulation of large-scale wireless networks ACM SIGSIM Simulation Digest 28 154-161
[9]
Nahrstedt K.(undefined)undefined undefined undefined undefined-undefined
[10]
Sloman M.(undefined)undefined undefined undefined undefined-undefined