Author:
Kumar Rakesh,Shekhar Shashi
Reference11 articles.
1. Popli, R., Garg, K., Batra, S.: Outlier detection using data mining in trust based clustered MANET’s. Int. J. Electr. Electron. Comput. Sci. Eng. 5(1), 2454–1222
2. Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: IEEE, Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 112–121 (2009)
3. Liu, Q., Wang, G., Li, F., Yang, S., Wu, J.: Preserving privacy with probabilistic in distinguish ability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28(5), 1417–1429 (2017, May).
https://doi.org/10.1109/tpds.2016.2615020
4. Jhaveri, R. H., Patel, N. M., Jinwala, D.C.: A composite trust model for secure routing in mobile ad-hoc networks. In: J.H. Ortiz, A.P. de la Cruz (eds.) Ad hoc networks, Rijeka, Croatia: InTech, pp. 19–45 (2017)
5. Khan, M.S., Khan, M.I., Malik, S.-U.-R., Khalid, O., Azim, M., Javaid, N.: MATF: a multi-attribute trust framework for MANETs. EURASIP J. Wirel. Commun. Netw. 2016(1), 197 (2016).
https://doi.org/10.1186/s13638-016-0691-4
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献