Author:
Abarghouei Babak Emami,Farokhtala Ali,Alizadeh Mojtaba
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference29 articles.
1. Balakrishnan, K., et al. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (pp. 2137–2142).
2. Xinyu, Y. et al. (2012). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. In Distributed computing systems (ICDCS), 2012 IEEE 32nd international conference on (pp. 92–101).
3. Liu, K., et al. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. Mobile Computing, IEEE Transactions on, 6, 536–550.
4. Zhang, Z., Xiong, X., & Deng, J. (2012). A novel key chain-based en-route filtering protocol for wireless sensor networks.
5. Wahengbam, M., & Marchang, N. (2012). Intrusion detection in MANET using fuzzy logic. In Emerging trends and applications in computer science (NCETACS), 2012 3rd national conference on (pp. 189–192).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献