共 50 条
- [31] Network forensics on mobile ad-hoc networks [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
- [33] Group Monitoring in Mobile Ad-Hoc Networks [J]. NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
- [34] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
- [35] Quantifying trust in mobile ad-hoc networks [J]. 2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
- [36] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
- [37] Interference Criteria for Mobile Ad-Hoc Networks [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1427 - 1432
- [38] An Optimization Strategy for Mobile Ad-hoc Networks [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 921 - 925
- [39] Wormhole Attack in Mobile Ad-hoc Networks [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
- [40] Routing protocols in mobile Ad-hoc networks [J]. Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 196 - 201