Author:
Subbiah Balaji,Obaidat Mohammad S.,Sriram Suthir,Manoharn Rajesh,Chandrasekaran Suresh Koneri
Publisher
Institution of Engineering and Technology (IET)
Subject
Control and Optimization,Management Science and Operations Research,Computer Networks and Communications
Reference26 articles.
1. EAACK – a secure intrusion-detection system for MANETs;IEEE Trans. Ind. Electron.,2013
2. Mitigating the effect of blackhole attack on MANETs using AODV protocol under transmission control protocol;Ad Hoc Sens. Wirel. Netw. J.,2018
3. Energy efficient administrator based secure routing in MANET;Adv. Comput. Sci. Eng. Appl.,2012
4. Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs;China Commun.,2017
5. Path observation based physical routing protocol for wireless Ad hoc networks;Wirel. Pers Commun.,2017
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献