共 50 条
- [1] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks [J]. ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419
- [2] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
- [3] Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1154 - 1159
- [4] Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07): : 1 - 16
- [5] Advanced detection of selfish or malicious nodes in ad hoc networks [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
- [6] An efficient scheme for detecting malicious nodes in mobile ad hoc networks [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
- [7] An Approach towards Identification of Malicious Nodes in Mobile Ad Hoc Networks [J]. 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 1016 - 1019
- [8] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972
- [9] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
- [10] Security scheme for malicious node detection in mobile ad hoc networks [J]. DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542