Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference20 articles.
1. Rizvi, S., Elleithy, M.: A new scheme for minimizing malicious behavior of mobile nodes in mobile ad hoc networks. Int. J. Comput. Sci. Inform. Secur. 3(1), 25–34 (2009)
2. Kariya, S.L., Panchal, B.B.: Selfish nodes detection in MANETs: acknowledgement based approach. Int. J. Sci. Res. 2(5), 216–217 (2012)
3. ArunKorath, D., Vineeth, K.V.: A survey on detecting selfish nodes in wireless sensor networks using different trust methodologies. Indian J. Appl. Res. 4(1), 193–194 (2011)
4. Patel, A.A., Soni, S.J.: A novel proposal for defending against vampire attack in WSN. In: 2015 Fifth International Conference on Communication Systems and Network Technologies, vol. 2, no. 1, pp. 22–29 (2015)
5. Patel, A., Patel, N., Patel, R.: Defending against wormhole attack in MANET. In: 2015 Fifth International Conference on Communication Systems and Network Technologies, vol. 3, no. 1, pp. 45–56 (2015)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献