共 50 条
- [3] Using a cache scheme to detect selfish nodes in mobile ad hoc networks [J]. PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 61 - 66
- [4] New approach for selfish nodes detection in mobile ad hoc networks [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 288 - 294
- [5] Random feedbacks for selfish nodes detection in mobile ad hoc networks [J]. OPERATIONS AND MANAGEMENT IN IP-BASED NETWORKS, PROCEEDINGS, 2005, 3751 : 68 - 75
- [6] Intrusion detection system for mobile Ad hoc networks based on the behavior of nodes [J]. Mamatha, S., 1600, Science and Engineering Research Support Society (07):
- [7] Intrusion Detection System for Mobile Ad hoc Networks Based on the Behavior of Nodes [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (06): : 241 - 256
- [8] An auction based AODV protocol for mobile ad hoc networks with selfish nodes [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3351 - 3356
- [9] Detection and prevention of selfish and misbehaving nodes at MAC layer in mobile ad hoc networks [J]. 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1857 - 1860
- [10] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260