메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 1118-1123

Denial of service attacks at the MAC layer in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CONGESTION CONTROL (COMMUNICATION); MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; SECURITY OF DATA; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION TRAFFIC;

EID: 0037003792     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (173)

References (8)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, November/December 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 2
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," ACM MOBICOM, 2000.
    • ACM MOBICOM, 2000
    • Zhang, Y.1    Lee, W.2
  • 5
    • 0035363918 scopus 로고    scopus 로고
    • Does the IEEE 802.11 MAC protocol work well in multi-hop wireless ad hoc networks
    • June
    • S.Xu and T.Saadawi, "Does the IEEE 802.11 MAC protocol work well in multi-hop wireless ad hoc networks," IEEE Communications Magazine, vol.39, Issue 6., June 2001.
    • (2001) IEEE Communications Magazine , vol.39 , Issue.6
    • Xu, S.1    Saadawi, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.