共 50 条
- [22] Wormhole Attack Avoidance Technique in Mobile Adhoc Networks [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 283 - 287
- [24] Detection and Isolation of Black Hole attack in Mobile Ad Hoc Networks - A Review [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES IV, 2020, 11419
- [26] A distributed protocol for detection of packet dropping attack in mobile ad hoc networks [J]. ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 75 - 80
- [27] Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol [J]. Arabian Journal for Science and Engineering, 2016, 41 : 1161 - 1172
- [29] Trace flooding attack in mobile ad hoc networks [J]. PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, : 329 - 334
- [30] PERFORMANCE OF MOBILE AD HOC NETWORKS UNDER ATTACK [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,