Author:
Rama Abirami K.,Sumithra M. G.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference15 articles.
1. Toh, C.: Ad Hoc Mobile Wireless Networks: Protocols and Systems, pp. 34–37. Prentice-Hall, New Jersey (2002)
2. Loay, A., Ashfaq, K., Mohsen, G.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)
3. Toh, C.K., Kim, D., Oh, S.: The Controversy of Selfish Nodes in Ad Hoc Networks. In: The 12th International Conference, South Korea, pp. 1088–1092 (2010)
4. Das, S.K., Saha, B.J., Chatterjee, P.S.: Selfish Node Detection and Its Behaviors in WSN. In: 5th International Conference on Computing Communication and Networking, China (2014)
5. Roy, D.B., Chaki, R.: Detection of Denial of Service Attacks Due to Selfish Node in MANET. Recent Trends Wirel. Mob. Netw.
https://doi.org/10.1007/978-3-642-21937-5_
(2011)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献