Author:
Vinoth Kumar V.,Ramamoorthy S.
Reference16 articles.
1. Erciyes, K. “Distributed Graph Algorithms for Computer Networks”, Computer Communications and Networks, London: Springer, pp. 259–275, (2013)
2. S. Abdel Hamid, H. Hassanein and G. Takahara, “Routing for Wireless Multi-Hop Networks: Unifying Features”, SpringerBriefs in Computer Science, pp. 11–23, (2013)
3. Hamid, S. A., Hassanein, H., & Takahara, G., “Routing for Wireless Multi Hop Networks–Unifying and Distinguishing Features”, School of Comp.—Queen’s University, Canada, report 583, (2011)
4. Habib, S., Saleem, S., & Saqib, K. M., “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCOReD, pp. 529–533, (2013)
5. A. Ahmed, K. Abu Bakar, M. Channa, K. Haseeb and A. Khan, “A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks”, Frontiers of Computer Science, vol. 9, no. 2, pp. 280–296, (2015)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献