-
2
-
-
50149092303
-
Performance Comparison of On-Demand and Table Driven Ad Hoc Routing Protocols Using NCTUns
-
A. Venugopal, K, Khaleel Ur Rahman, Zaman, Rafi U., Reddy, "Performance Comparison of On-Demand and Table Driven Ad Hoc Routing Protocols Using NCTUns.", Computer Modeling and Simulation, UKSIM, Tenth International Conference on 1-3 April 2008 Page(s):336-341.
-
Computer Modeling and Simulation, UKSIM, Tenth International Conference on 1-3 April 2008
, pp. 336-341
-
-
Venugopal, A.1
Khaleel Ur Rahman, K.2
Zaman3
Rafi, U.4
Reddy5
-
6
-
-
41949127322
-
Security in Mobile Ad Hoc Networks
-
March-April
-
M.Carvalho, "Security in Mobile Ad Hoc Networks", Security & Privacy, IEEE, Volume 6, Issue 2, March-April 2008 Page(s):72-75.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.2
, pp. 72-75
-
-
Carvalho, M.1
-
7
-
-
0037003792
-
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
-
V. Gupta, S. V. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks", In Proc. of MILCOM, 2002, page(s): 202-215.
-
Proc. of MILCOM, 2002
, pp. 202-215
-
-
Gupta, V.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
8
-
-
50149105732
-
Impact of Denial of Service Attacks on Ad Hoc Networks
-
Aug.
-
I. Aad, J. Hubaux, W. Knightly E, "Impact of Denial of Service Attacks on Ad Hoc Networks", Networking, IEEE/ACM Transactions on Volume16, Issue 4, Aug. 2008 Page(s):791-802.
-
(2008)
Networking, IEEE/ACM Transactions on
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.2
Knightly E, W.3
-
10
-
-
51849126004
-
-
Master's Thesis in Computing Science, Ume° a University, Department of Computing Science, Sweden
-
K. Gorantala, "Routing Protocols in Mobile Ad-hoc Networks.", Master's Thesis in Computing Science, Ume° a University, Department of Computing Science, Sweden, 2006.
-
(2006)
Routing Protocols in Mobile Ad-hoc Networks
-
-
Gorantala, K.1
-
11
-
-
77952180625
-
Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms
-
The University of Western Australia, Crawley, December 15, chapter 6
-
A. Amir Pirzada, "Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms.", School of Computer Science and Software Engineering The University of Western Australia, Crawley, December 15, 2008, chapter 6, Page(s):131-157.
-
(2008)
School of Computer Science and Software Engineering
, pp. 131-157
-
-
Amir Pirzada, A.1
-
12
-
-
33747325673
-
Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
-
DOI 10.1109/WIMOB.2005.1512897, 1512897, 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
-
L. Guang, C. Assi,"Vulnerabilities of Ad Hoc Network Routing Protocols To MAC Misbehavior.", Wireless And Mobile Computing, Networking And Communication, IEEE International Conference on Volume3, 22-24 Aug. 2005 Page(s):146-153. (Pubitemid 44235055)
-
(2005)
2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
, vol.3
, pp. 146-153
-
-
Guang, L.1
Assi, C.2
-
13
-
-
50949097831
-
Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
-
Dr. March
-
L. Tamilselvan and Dr. V. Sankaranarayanan, "Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks.", IJCSN International Journal of computer Science and network Security, Volume 7, No.3, March 2007, page(s):118-123.
-
(2007)
IJCSN International Journal of Computer Science and Network Security
, vol.7
, Issue.3
, pp. 118-123
-
-
Tamilselvan, L.1
Sankaranarayanan, V.2
-
14
-
-
0004195002
-
-
K. Fall, and K.Vardhan, Eds., available from
-
K. Fall, and K.Vardhan, Eds., 1999, Ns notes and documentation, available from http://wwwmash.cd.berkeley.edu/ns/.
-
(1999)
Ns Notes and Documentation
-
-
-
15
-
-
33748363759
-
IEEE 802.11 ad hoc networks: Protocols, performance and open issues
-
S.Basagni, M.Conti, S.Giordano, I.Stojmenvoic (Eds), IEEE Press Wiley, New York
-
E. Borgia, G. Anastasi, M.Conti, E.Gregori, 2003, IEEE 802.11 ad hoc networks: protocols, performance and open issues, in: S.Basagni, M.Conti, S.Giordano, I.Stojmenvoic (Eds), Ad hoc Networking, IEEE Press Wiley, New York.
-
(2003)
Ad Hoc Networking
-
-
Borgia, E.1
Anastasi, G.2
Conti, M.3
Gregori, E.4
-
16
-
-
0027629456
-
Development of WaveLAN, an ISM Band Wireless LAN
-
B. Tuch, "Development of WaveLAN, an ISM Band Wireless LAN", AT&T Tech. J.,vol. 72, no. 4, 1993, page(s): 27-33.
-
(1993)
AT&T Tech. J.
, vol.72
, Issue.4
, pp. 27-33
-
-
Tuch, B.1
-
17
-
-
84943571614
-
IEEE 802.11 ad hoc networks: Performance measurements, icdcsw
-
G. Anastasi, E.Borgia, M.Conti, E.Gregori, 2003, IEEE 802.11 ad hoc networks: performance measurements, icdcsw, p. 758, 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW'03).
-
(2003)
23rd International Conference on Distributed Computing Systems Workshops (ICDCSW'03)
, pp. 758
-
-
Anastasi, G.1
Borgia, E.2
Conti, M.3
Gregori, E.4
-
19
-
-
84888415851
-
-
PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Available from
-
A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks, PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Available from: www.cse.cuhk.edu.hk/lyu/student/phd/gigi/term4/.
-
A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks
-
-
-
20
-
-
43449107967
-
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
-
June
-
Imran Raza , S. A. Hussain, Identification of malicious nodes in an AODV pure ad hoc network through guard nodes, Computer Communications, v.31 n.9, p.1796-1802, June, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.9
, pp. 1796-1802
-
-
Raza, I.1
Hussain, S.A.2
-
21
-
-
33749611840
-
-
Huntsville, AL, USA, April
-
Seungjin Park, M. Al-Shurman, Seong-Moo Yoo, Black Hole Attack in Mobile Ad hoc Network, ACMSE'04, Huntsville, AL, USA, April 2004.
-
(2004)
Black Hole Attack in Mobile Ad Hoc Network, ACMSE'04
-
-
Park, S.1
Al-Shurman, M.2
Yoo, S.-M.3
-
22
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston, 2000.
-
Proc. of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston, 2000
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
|