Author:
El Houssaini Mohammed-Alamine,Ajjaj Souad,El Houssaini Souad,Nabou Abdellah,El Kafi Jamal
Publisher
Springer International Publishing
Reference13 articles.
1. Al-Absi, M.A., Al-Absi, A.A., Sain, M., Lee, H.: Moving Ad Hoc networks—a comparative study. Sustainability 13, 6187 (2021). https://doi.org/10.3390/su13116187
2. Ye, C., Li, Y., Reznik, A.: Performance analysis of exponential increase exponential decrease back-off algorithm. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1–6 (2010). https://doi.org/10.1109/GLOCOM.2010.5683538
3. Hoang, T.-M., Bui, V.-K., Nguyen, T.-T.: The performance evaluation of an IEEE 802.11 network containing misbehavior nodes under different backoff algorithms. Secur. Commun. Netw. 2017, 1–8 (2017). https://doi.org/10.1155/2017/2459780
4. Seth, A.D., Biswas, S., Dhar, A.K.: De-authentication attack detection using discrete event systems in 802.11 Wi-Fi networks. In: 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6 (2019). https://doi.org/10.1109/ANTS47819.2019.9118100
5. IEEE Standards Association: IEEE 802.11 Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Standards Association, pp. 818–840, March 2012