共 50 条
- [1] Replica update strategies in mobile ad hoc networks [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 302 - 306
- [2] A survey of Attacks in Mobile Ad hoc Networks [J]. 2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
- [3] Interlayer attacks in mobile ad hoc networks [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 436 - +
- [4] Classification of Mobile Ad Hoc Networks Attacks [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 618 - 624
- [5] MOTION: An Application of ASMETA to Mobile Ad-hoc NETworks Domain [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
- [6] Detecting Sybil attacks in vehicular ad hoc networks [J]. Hamdan, Salam (S.hamdan@psut.edu.jo), 1600, Taylor and Francis Ltd. (36): : 69 - 79
- [8] Routing attacks and solutions in mobile ad hoc networks [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
- [9] Masquerading Attacks Detection in Mobile Ad Hoc Networks [J]. IEEE ACCESS, 2018, 6 : 55013 - 55025