共 50 条
- [31] Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 179 - 184
- [32] One method for selfish nodes security problem in ad hoc networks Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (SUPPL.): : 2317 - 2321
- [33] A Way to Solve the Threat of Selfish and Malicious Nodes for Ad hoc Networks ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 368 - 370
- [34] Truthful topology control in Wireless Ad Hoc Networks with selfish nodes 2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2006, : 203 - 210
- [35] Intrusion detection system for mobile Ad hoc networks based on the behavior of nodes Mamatha, S., 1600, Science and Engineering Research Support Society (07):
- [36] Detection of colluding misbehaving nodes in Mobile Ad hoc and Wireless Mesh Networks GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5097 - 5101
- [37] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
- [38] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
- [39] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419