共 50 条
- [41] Modeling Trust in Wireless Ad-Hoc Networks [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
- [43] TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 80 - 91
- [44] Quantifying trust in mobile ad-hoc networks [J]. 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
- [45] Trust Establishment In Pure Ad-hoc Networks [J]. Wireless Personal Communications, 2006, 37 : 139 - 168
- [46] Trust Assessment in Wireless Ad-hoc Networks [J]. 2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
- [48] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
- [49] Trust-based Approaches to Solve Routing Issues in Ad-hoc Wireless Networks: A Survey [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 556 - 563
- [50] A survey of authentication mechanisms - Authentication for ad-hoc wireless sensor networks [J]. 2007 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2007, : 107 - +