共 50 条
- [1] The Goal of Securing Mobile Ad-Hoc Network and Solutions ADVANCES IN DIGITAL IMAGE PROCESSING AND INFORMATION TECHNOLOGY, 2011, 205 : 355 - 365
- [2] Securing Mobile Agent's Information in Ad-Hoc Network 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 442 - 446
- [3] Unmasking threats in mobile wireless ad-hoc network settings WSEAS Transactions on Communications, 2007, 6 (01): : 104 - 110
- [5] Reliable mobile ad-hoc network PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 371 - +
- [6] Securing AODV Routing Protocol in Mobile Ad-Hoc Networks ACTIVE AND PROGRAMMABLE NETWORKS, 2009, 4388 : 182 - +
- [7] Network forensics on mobile ad-hoc networks KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
- [8] Forming Trust in Mobile Ad-Hoc Network 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 470 - +
- [9] Simulation framework for Mobile Ad-Hoc network ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 739 - 743
- [10] Mobile Ad-hoc Network Management in the Cloud 2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2014, : 140 - 147