Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference37 articles.
1. Raoof, A., Matrawy, A., & Lung, C. H. (2018). Routing attacks and mitigation methods for RPL-based internet of things. IEEE Communications Surveys & Tutorials, 21(2), 1582–1606.
2. Balaji, S., Julie, E. G., Robinson, Y. H., Kumar, R., & Son, L. H. (2019). Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model. Computer Standards & Interfaces, 66. Article 103358.
3. Schweitzer, N., Stulman, A., Margalit, R. D., & Shabtai, A. (2017). Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Journals & Magazines, 16(08), 2174–2183.
4. Xu, T., Gao, D., Dong, P., Zhang, H., Foh, C. H., & Chao, H.-C. (2017). Defending against new-flow attack in SDN-based internet of things. IEEE Journals & Magazines, 05, 3431–3443.
5. Lomotey, R. K., Pry, J., & Sriramoju, S. (2017). Wearable IoT data stream traceability in a distributed health information system. Pervasive and Mobile Computing, 40, 692–707.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献