Author:
Duraipandian M.,Palanisamy C.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference18 articles.
1. Zhang, D., Gogi, S. A., Broyles, D. S., Cetinkaya, E. K., & Sterbenz, J. P. G. (2012). Modelling attacks and challenges to wireless networks. In 4th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), 2012 (pp. 806–812). IEEE.
2. Khouzani, M. H. R., Sarkar, S., & Altman, E. (2012). Maximum damage malware attack in mobile wireless networks. IEEE/ACM Transactions on Networking (TON), 20(5), 1347–1360.
3. Li, L., Zhang, G., Nie, J., Niu, Y., & Yao, A. (2012). The application of genetic algorithm to intrusion detection in MP2P network. In Y. Tan, Y. Shi & Z. Ji (Eds.), Advances in swarm intelligence (pp. 390–397). Berlin: Springer.
4. Ratna, S. R., Ravi, R., & Shekhar, B. (2013). Mitigating denial of service attacks in wireless networks. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), 1716.
5. Luo, Z., & Jannett, T. C. (2012). A multi-objective method to balance energy consumption and performance for energy-based target localization in wireless sensor networks. In Proceedings of IEEE Southeastcon, 2012 (pp. 1–6). IEEE.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献