Author:
Chen Weixing,Meng Meihan,Su Jingfang
Reference12 articles.
1. Bambang, S., Michael, P.H.: Transfer reliability and congestion control strategies in opportunistic networks: a survey. IEEE Commun. Surv. Tutorials 16, 538–555 (2014)
2. Wu, D.P., Zhang, H.P., Wang, H.G., et al.: Quality-of-protection-driven data forwarding for intermittently connected wireless networks. Wirel. Commun. 22, 66–73 (2015)
3. Navaz, A.S.S.: An efficient intrusion detection scheme for mitigating nodes using data aggregation in delay tolerant network. Int. J. Sci. Eng. Res. 6, 421–428 (2015)
4. Wu, D.P., Zhang, P.N., Wang, R.Y.: Adaptive buffer management strategy with message delivery probability estimating method in opportunistic networks. J. Electron. Inf. Technol. 36(2), 390–395 (2014)
5. Keykhaie, S., Rostaei, M.: Congestion- and selfishness-aware social routing in delay tolerant networks. In: Proceedings of the 7th International Conference on Computer and Knowledge Engineering, Mashhad, pp. 439–444 (2017)