Author:
Samad Fahad,Abu Ahmed Qassem,Shaikh Asadullah,Aziz Abdul
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Zapata, M.G.: Secure ad hoc on-demand distance vector (saodv) routing. INTERNET-DRAFT draft-guerreromanet-saodv-06 (September 2006)
2. Kargl, et al.: Secure dynamic source routing. In: Hawaii International Conference on System Sciences, vol. 9, p. 320c (2005)
3. Nadeem, A., Howarth, M.: Adaptive intrusion detection & prevention of denial of service attacks in manets. In: Proceedings of the Int. Conf. on Wireless Comm. and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, pp. 926–930 (2009)
4. Boukerche, et al.: An adaptive computational trust model for mobile ad hoc networks. In: Proceedings of Int. Conf. on Wireless Comm. and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, pp. 191–195 (2009)
5. Pirzada, A., Mcdonald, C.: Trust establishment in pure ad-hoc networks. Wireless Personal Communications 37, 139–168 (2006)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献