共 50 条
- [41] A Novel Intrusion Detection System for Ad Hoc Flooding Attack Using Fuzzy Logic in Mobile Ad Hoc Networks [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
- [42] Wormhole attack detection techniques in ad-hoc network: A systematic review [J]. OPEN COMPUTER SCIENCE, 2022, 12 (01): : 260 - 288
- [43] FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks [J]. Wireless Personal Communications, 2018, 101 : 1901 - 1927
- [45] Novel gray hole attack detection scheme for mobile ad-hoc networks [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377
- [47] On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 532 - 539
- [48] Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks [J]. 2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 30 - 36
- [49] A Novel Gray Hole attack detection scheme for Mobile Ad-Hoc Networks [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 209 - 214
- [50] Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2993 - 2996