Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference56 articles.
1. Denko, M. K. (2005). Detection and prevention of denial of service (dos) attacks in mobile ad hoc networks using reputation-based incentive scheme. Journal of Systemics, Cybernetics and Informatics, 3(4), 1–9.
2. Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20.
3. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.
4. Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.
5. Gavel, S., Raghuvanshi, A. S., & Tiwari, S. (2021). Maximum correlation based mutual information scheme for intrusion detection in the data networks. Expert Systems with Applications, 189, 116089.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献