Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference50 articles.
1. Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless (Vol. 5, pp. 153–181). Norwell: Kluwer.
2. Kenkre, P. S., Pai, A., & Colaco, L., (2015), Real time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405–411). Springer.
3. Stakhanova, N., Basu, S., & Wong, J. (2006). Taxonomy of intrusion response systems. Computer Science, Iowa State University, Technical report 06-05.
4. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550.
5. Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., & Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials,17(4), 2461–2492.
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献