共 50 条
- [2] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J]. Frontiers of Computer Science, 2015, 9 : 280 - 296
- [5] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks [J]. IEEE ACCESS, 2024, 12 : 95390 - 95401
- [6] Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07): : 1 - 16
- [7] Detecting and isolating malicious nodes in wireless ad hoc networks [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
- [8] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
- [9] Advanced detection of selfish or malicious nodes in ad hoc networks [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
- [10] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194