共 50 条
- [31] Privacy preserving set intersection protocol secure against malicious behaviors EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 461 - 468
- [32] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
- [33] RETRACTED ARTICLE: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET Wireless Personal Communications, 2021, 119 : 21 - 35
- [34] Retraction Note: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET Wireless Personal Communications, 2023, 128 : 731 - 732
- [35] Detecting malicious beacon nodes for secure location discovery in wireless sensor networks 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 609 - 619
- [38] Detecting and blocking malicious traffic caused by IRC protocol based botnets 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 485 - 489
- [40] Topology Refresh Data Forwarding Protocol for Opportunistic Networks 2015 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2015,