Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference36 articles.
1. Juneja V, Gupta DV (2018) Security against vampire attack in ADHOC wireless sensor network: detection and prevention techniques. In: International Conference on Wireless Intelligent and Distributed Environment for Communication. Springer, Cham, pp 25–38
2. Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004
3. Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. Int J Comput Sci Netw Solut 2:37–56
4. Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95
5. Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci (IJITCS) 5(6):2013
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献