Author:
Lal Nidhi,Kumar Shishupal,Saxena Aditya,Chaurasiya Vijay Km.
Reference32 articles.
1. Istikmal, “Analysis and evaluation optimization dynamic source routing (DSR) protocol in Mobile Adhoc network based on ant algorithm,” Information and Communication Technology (ICoICT), 2013 International Conference of , vol., no., pp.400,404, 20-22 March 2013.
2. Malany, A.B.; Chandrasekaran, R.M., “Analysing the Data Variation of QOS in Mobile Adhoc Networks,” Advances in Recent Technologies in Communication and Computing, 2009. ARTCom ‘09. International Conference on , vol., no., pp.881,883, 27-28 Oct. 2009 .
3. Shahnawaz, H.; Gupta, S.C.; Mukesh, C., “Denial of Service attack in AODV & friend features extraction to design detection engine for intrusion detection system in Mobile Adhoc Network,” Computer and Communication Technology (ICCCT), 2011 2nd International Conference on , vol., no., pp.292,297, 15-17 Sept. 2011.
4. Xiaohai Wei, Guoliang Chen, Yingyu Wan, Fred Mtenzi, Optimized priority based energy efficient routing algorithm for mobile ad hoc networks, Ad Hoc Networks, Volume 2, Issue 3, July 2004, Pages 231-239, ISSN 1570-8705 http://dx.doi.org/10.1016/j.adhoc.2004.03.002.
5. Santhosh Krishna, B.V., and A. L. Vallikannu. “Detecting malicious nodes for secure routing in MANETS using reputation based mechanism.” Int. J. Sci. Eng. Res 1.3.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献