Author:
Menaka R.,Ramesh R.,Dhanagopal R.
Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0885-1
2. Alvarez R, Caballero C, Santonja J, Zamora A (2016) Algorithms for lightweight key exchange. In: Ubiquitous computing and ambient intelligence: sensors, vol 17, Issue 7. Springer, pp 536–543
3. Babar AK, Zardari ZA, Hussaini NN, Qureshi S, Han S (2019) Assessment of IPv4 and IPv6 networks with different modified tunneling techniques using OPNET. Int J Adv Comput Sci Appl 10:476–482
4. Burlachenko I, Zhuravska I, Davydenko Y, Savinov V (2018) Vulnerabilities analysis and defense based on MAS method in fast dynamic wireless networks. In: 2018 IEEE 4th international symposium on wireless systems within the international conferences on intelligent data acquisition and advanced computing systems (IDAACS-SWS), Lviv, pp 98–102
5. Dai J, Xu X (2019) A analysis of attack and defense mobile ad hoc network based on OPNET. In: IOP conference series: materials science and engineering, vol 611, conference 1, IOP 2019, pp 1–7
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献