Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference30 articles.
1. Verma, A., & Khare, A. (2013). TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET. International Journal of Computer Applications, 63(16), 1–4.
2. Lamba, G. K. (2016). Varying Number of Selfish Nodes based Simulation of AODV Routing Protocol in MANET using Reputation Based Scheme. International Journal Of Engineering And Computer Science, 1(2), 89–97.
3. Priya, M. D., Sengathir, J., & Valarmathi, M. L. (2010) Root node attack in a WiMAX 802.16e network. Trendz in Information Sciences & Computing(TISC2010), 1(1) 34–45.
4. Sengathir, J., & Manoharan, R. (2013). Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs. International Journal of Computer Network and Information Security, 5(10), 1–10.
5. Kariya, S. L., & Panchal, B. B. (2012). Selfish Nodes Detection in MANETs: Acknowledgement Based Approach. International Journal of Scientific Research, 2(5), 216–217.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献