共 50 条
- [31] Detection of malicious node using Improved CONFIDANT Technique in Ad-hoc Networks [J]. PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 604 - 610
- [32] Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks [J]. Multimedia Tools and Applications, 2013, 66 : 325 - 338
- [33] New trust based security approach for ad-hoc networks [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 428 - 431
- [34] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks [J]. IEEE ACCESS, 2024, 12 : 95390 - 95401
- [35] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
- [36] Trust-based routing for ad-hoc wireless networks [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
- [37] Distributed Trust Based Routing in Mobile Ad-Hoc Networks [J]. 2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 1801 - 1807
- [39] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks [J]. Wireless Personal Communications, 2018, 100 : 311 - 320
- [40] Trust establishment in pure ad-hoc networks [J]. WIRELESS PERSONAL COMMUNICATIONS, 2006, 37 (1-2) : 139 - 163