Author:
Förster Anna,Manzoni Pietro,Orallo Enrique Hernández,Kuladinithi Koojana,Udugama Asanga
Publisher
Springer Nature Switzerland
Reference6 articles.
1. Hansman, S., and Hunt, R. A taxonomy of network and computer attacks. Computers & Security 24, 1 (2005), 31–43.
2. Hoque, N., Bhuyan, M. H., Baishya, R., Bhattacharyya, D., and Kalita, J. Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications 40 (2014), 307–324.
3. Kuppusamy, V., Thanthrige, U. M., Udugama, A., and Förster, A. Evaluating forwarding protocols in opportunistic networks: Trends, advances, challenges and best practices. Future Internet 11, 5 (2019), 113.
4. Sbai, O., and Elboukhari, M. Classification of mobile ad hoc networks attacks. In 2018 IEEE 5th International Congress on Information Science and Technology (CiSt) (2018), pp. 618–624.
5. Udugama, A., Khalilov, B., Muslim, A. B., and Förster, A. Implementation of the swim mobility model in omnet++. In Proceedings of the 3rd International OMNeT++ Summit (2016).