共 50 条
- [1] Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1154 - 1159
- [3] Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks [J]. Wireless Personal Communications, 2022, 124 : 1511 - 1524
- [4] An efficient scheme for detecting malicious nodes in mobile ad hoc networks [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
- [5] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
- [6] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
- [7] Detecting and isolating malicious nodes in wireless ad hoc networks [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
- [8] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
- [9] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
- [10] Advanced detection of selfish or malicious nodes in ad hoc networks [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165