Author:
Annappa P. H.,Shenoy Udaya Kumar K.,Shiva Prakash S. P.
Reference8 articles.
1. Bradley, K.: Detecting disruptive routers: a distributed network monitoring approach. IEEE Netw. 12, 50–60 (1998)
2. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: 6th Annual ACM International Conference on Mobile Computing and Networking, pp. 275–283. Boston (2000)
3. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th Annual ACM International Conference on Mobile Computing and Networking, pp. 255–265. Boston (2000)
4. Ramanujan, R., Ahamad, A., Bonney, J., Hagelstrom, R., Thurber, K.: Techniques for intrusion-resistant ad hoc routing algorithms (tiara), pp. 660–664 (2000)
5. Bhargava, S., Agrawal, D.: Security enhancements in aodv protocol for wireless ad hoc networks. In: 2001 IEEE Vehicular Technology Conference, pp. 2143–2147 (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献