Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference36 articles.
1. Van G, Greeven MJ (2016) Mobile telecommunication standardization in Japan, China, the United States, and Europe: a comparison of regulatory and industrial regimes. Telecommunication Systems, p 1–12. doi:
10.1007/s11235-016-0214-y
2. Bricha N, Nourelfath M (2014) Extra-capacity versus protection for supply networks under attack. Reliab Eng Syst Saf 131:185–196
3. Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7:10–16
4. Fotohi R, Jamali SHA (2014) comprehensive study on defence against wormhole attack methods in mobile Ad hoc Networks. Int J Comput Sci Netw Solut 2:37–56
5. Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2016) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41–67
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献