Author:
Gandotra Pimmy,Kumar Jha Rakesh,Jain Sanjeev
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference163 articles.
1. Muraleedharan, Rajani, Lisa A. Osadciw, 2006. Jamming attack detection and countermeasures in wireless sensor network using ant system. In: Proceedings of the Defense and Security Symposium. International Society for Optics and Photonics.
2. 3GPP TR 22.803, 2012. Feasibility study for proximity services (ProSe) (Release 12), v. 12. 2. 0, June
3. 3GPP TR 23.703, 2013. Study on architecture enhancements to support proximity services (ProSe) (Release 12), v. 1. 0. 0 , December.
4. Gjendemsjo, A., Gesbert, D., Oien, G.E., Kiani, S.G., 2006. Optimal power allocation and scheduling for two-cell capacity maximization. In: Proceedings of the International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
5. Abd-Elrahman, Emad, Hatem Ibn-khedher, Hossam Afifi. D2D group communications security. In: Proceedings of the 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), . IEEE, 2015.
Cited by
166 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献