共 50 条
- [21] From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
- [23] Detecting node misbehavior in ad hoc networks [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3425 - +
- [24] Privacy Preserving Solution for the Protection Against Sybil Attacks in Vehicular Ad Hoc Networks [J]. 2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
- [25] Routing to preserve energy in ad hoc networks subject to jamming [J]. MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1213 - 1219
- [26] Effect of Jamming Signals on Wireless Ad Hoc and Sensor Networks [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5629 - 5634
- [28] Routing attacks and solutions in mobile ad hoc networks [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
- [30] Masquerading Attacks Detection in Mobile Ad Hoc Networks [J]. IEEE ACCESS, 2018, 6 : 55013 - 55025