Author:
Ullah Kefayat,Das Prodipto
Reference11 articles.
1. Mishra and Nadkarni: Security in Wireless Ad-hoc Network, The Hand book of Ad Hoc Wireless Networks, CRC press LLC (2003)
2. Elizabeth M. Royer: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, University of California, Santa Barbara Chai-Keong Toh, Georgia Institute of Technology, IEEE personal communication, April (1999)
3. Xiao, Y., Shen, X. and D. -Z. Du(Eds.): A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless/Mobile Network Security, Springer (2006)
4. Mohammad llyas and Richard Dorf., C.: The handbook of ad hoc wireless networks (2003)
5. Bhalaji, N, Shanmugam, A: Association between nodes to Combat Blackhole attack in DSR based MANET, in Proceedings of the Sixth IFIP-IEEE WOCN, April 28–30, Cairo, 403–407, ISBN: 978-1-4244-4704-, https://doi.org/10.1109/wocn.2009.5010579 (2009)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献