Author:
Marathe Nilesh R.,Shinde Subhash K.
Reference13 articles.
1. E.M. Shakshuki, N. Kang, T.R. Sheltami, EAACK—a secure intrusion-detection system for manets. IEEE Trans. Ind. Electron. 60(3), 1089–1098 (2013)
2. T. Sheltami, A. Al-Roubaiey, E. Shakshuki, A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in manets. Multimed. Syst. 15(5), 273–282 (2009).
https://doi.org/10.1007/s00530-009-0166-0
3. D. Sandhiya, K. Sangeetha, R. Latha, Adaptive acknowledgement technique with key exchange mechanism for manet, in 2014 International Conference on Electronics and Communication Systems (ICECS), Feb 2014, pp. 1–5
4. K. Balakrishnan, J. Deng, V.K. Varshney, TWOACK: preventing selfishness in mobile ad hoc networks, in IEEE Wireless Communications and Networking Conference, 2005, vol. 4, March 2005, pp. 2137–2142
5. N. Marathe, S.K. Shinde, ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing. Wirel. Pers. Commun. (2019),
https://doi.org/10.1007/s11277-019-06282-5
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献