Author:
Neeli Jyoti,Cauvery N. K.
Publisher
Springer International Publishing
Reference30 articles.
1. Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd edn., p. 349. CRC Press (2016)
2. Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks, p. 316. Wiley, New York (2007)
3. Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K.: Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016, vol. 1, p. 775. Springer, Singapore (2017)
4. Khan, S., Pathan, A.-S.K.: Wireless Networks and Security: Issues, Challenges and Research Trends, p. 512. Springer, Heidelberg (2013)
5. Rawat, D.B.: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, p. 577. IGI Global, Hershey (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Threat Intelligence Disclosure Trend Analysis Model Based on Time Series;2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT);2021-12