-
2
-
-
47149098160
-
-
D.B. Johnson, D.A. Maltz, and Y. Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF MANET, Internet Draft, 2003.
-
D.B. Johnson, D.A. Maltz, and Y. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)", IETF MANET, Internet Draft, 2003.
-
-
-
-
3
-
-
0032621035
-
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
-
E.M. Royer and C.K. Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", IEEE Personal Communication Magazine, vol. 6, no. 2, 1999, pp. 46-55.
-
(1999)
IEEE Personal Communication Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
4
-
-
0036804761
-
wei Li and Dharma P.Agrawal " Routing security in Wireless Ad Hoc Networks
-
Oct
-
Hongmei deng, wei Li and Dharma P.Agrawal " Routing security in Wireless Ad Hoc Networks", IEEE Communications magazine, Oct 2002, 70-75.
-
(2002)
IEEE Communications magazine
, pp. 70-75
-
-
Hongmei deng1
-
5
-
-
1842815887
-
Security in Mobile Ad Hoc Networks: Challenges and solutions
-
Feb
-
Hao yang et al, "Security in Mobile Ad Hoc Networks: Challenges and solutions", IEEE Wireless Communications, Feb 2004, pp. 38-47.
-
(2004)
IEEE Wireless Communications
, pp. 38-47
-
-
Hao yang1
-
6
-
-
84892591410
-
A Survey of Security issues in Mobile Ad Hoc and Sensor Networks
-
Fourth Quarter
-
Djamel Djenouri And Lyes Khelladi, "A Survey of Security issues in Mobile Ad Hoc and Sensor Networks", IEEE Communications Surveys & Tutorials, Volume 7, No. 4, Fourth Quarter 2005, pp. 2-28.
-
(2005)
IEEE Communications Surveys & Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri And, D.1
Khelladi, L.2
-
7
-
-
84903836776
-
-
th annual IEEE information assurance workshop, west point, June 2003, pp. 60-67.
-
th annual IEEE information assurance workshop, west point, June 2003, pp. 60-67.
-
-
-
-
10
-
-
47149096122
-
-
Yih Chun Hu et al., Rushing attacks and Defence in Wireless Ad Hoc Network Routing Protocol, Proceedings of ACM workshop on Wireless security, September, 2003.
-
Yih Chun Hu et al., "Rushing attacks and Defence in Wireless Ad Hoc Network Routing Protocol", Proceedings of ACM workshop on Wireless security, September, 2003.
-
-
-
-
11
-
-
0033357103
-
Securing Ad Hoc Networks
-
Nov/Dec
-
L.Zhou and Z.J.Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, Vol 13, no 6, Nov/Dec 1999, pp.24-30.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
13
-
-
84961572484
-
Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y. Hu, D. Johnson, and A. Perrig, "Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 3-13.
-
(2002)
IEEE Workshop on Mobile Computing Systems and Applications
, pp. 3-13
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
14
-
-
0036957315
-
Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks
-
Y.C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks," Proceedings on Eighth Annual Int'l Conf. Mobile Computing and Networking (MobiCom), 2002, pp. 12-23.
-
(2002)
Proceedings on Eighth Annual Int'l Conf. Mobile Computing and Networking (MobiCom)
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
84904904836
-
A Secure Routing Protocol for Ad Hoc Networks
-
B. Dahill, B.N. Levine, E. Royer, and C. Shields, "A Secure Routing Protocol for Ad Hoc Networks," Proc. Int'l Conf. Network Protocols (ICNP), 2002, pp. 78-87.
-
(2002)
Proc. Int'l Conf. Network Protocols (ICNP)
, pp. 78-87
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
16
-
-
33144479525
-
SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks
-
Feb
-
H. Yang, X. Meng, and S. Lu, "SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks", IEEE Journal On Selected Areas In Communications, Vol. 24, No. 2, Feb. 2006, pp.261-273.
-
(2006)
IEEE Journal On Selected Areas In Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
17
-
-
34547610382
-
Secure Routing for Mobile Ad hoc Networks
-
Third quarter
-
Patroklos G. Argyroudis and Donal O'mahony, "Secure Routing for Mobile Ad hoc Networks", IEEE communication surveys, Vol. 7, No.3, Third quarter, 2005, pp. 2-21.
-
(2005)
IEEE communication surveys
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.G.1
O'mahony, D.2
-
19
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. Sixth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom), 2000, pp. 255-265.
-
(2000)
Proc. Sixth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
23
-
-
0042660545
-
-
L. Buttyan and J. Hubaux, Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks, Proc. ACM/Kluwer Mobile Networks and Applications (MONET), 8, 2003, pp. 579-592.
-
L. Buttyan and J. Hubaux, "Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks," Proc. ACM/Kluwer Mobile Networks and Applications (MONET), vol. 8, 2003, pp. 579-592.
-
-
-
-
24
-
-
33646410469
-
Performance Comparison Of Trust-Based Reactive Routing Protocols
-
June
-
Pirzada et al., " Performance Comparison Of Trust-Based Reactive Routing Protocols", IEEE Transactions on Mobile Computing, Vol. 5, No. 6, June 2006, pp. 695-710.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.6
, pp. 695-710
-
-
Pirzada1
-
26
-
-
0025404409
-
Fuzzy logic in control systems: Fuzzy logic controller, Part I and II
-
C. Lee, "Fuzzy logic in control systems: fuzzy logic controller, Part I and II", IEEE Trans. Syst., Man & Cybern., Vol. 20, 1990, pp. 404-435.
-
(1990)
IEEE Trans. Syst., Man & Cybern
, vol.20
, pp. 404-435
-
-
Lee, C.1
-
27
-
-
0032186636
-
Parsec: A Parallel simulation environment for complex systems
-
R.Bagrodia, R.Meyer, M.Takai, et.al.,"Parsec: A Parallel simulation environment for complex systems," IEEE Computer, vol.31,no.10, 1998, pp.77-85.
-
(1998)
IEEE Computer
, vol.31
, Issue.10
, pp. 77-85
-
-
Bagrodia, R.1
Meyer, R.2
Takai, M.3
-
28
-
-
28444495494
-
Supporting QoS in MANET by a Fuzzy Priority Scheduler and Performance Analysis with Multicast Routing Protocols
-
C.Gomathy and S.Shanmugavel, "Supporting QoS in MANET by a Fuzzy Priority Scheduler and Performance Analysis with Multicast Routing Protocols", EURASIP Journal on Wireless Communications and Networking, 3:2005, pp.426-436.
-
(2005)
EURASIP Journal on Wireless Communications and Networking
, vol.3
, pp. 426-436
-
-
Gomathy, C.1
Shanmugavel, S.2
|