-
1
-
-
39749119803
-
Self-organizing networks [message from the editor-in-chief]
-
Dec.
-
A. Jamalipour, "Self-organizing networks [message from the editor-in-chief]," IEEE Wireless Communications, vol.15, no.6, pp.2-3, Dec. 2008.
-
(2008)
IEEE Wireless Communications
, vol.15
, Issue.6
, pp. 2-3
-
-
Jamalipour, A.1
-
2
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
Jun.
-
S.-J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks," IEEE International Conference on Communications (ICC 2001), vol.10, pp. 3201-3205, Jun. 2001.
-
(2001)
IEEE International Conference on Communications (ICC 2001)
, vol.10
, pp. 3201-3205
-
-
Lee, S.-J.1
Gerla, M.2
-
4
-
-
77953095994
-
Black hole attack in mobile ad hoc networks
-
Apr.
-
M. Al-Shurman, S.-M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," the 42nd annual Southeast regional conference ACM Southeast Regional Conference (ACMSE 2004), pp. 96-97, Apr. 2004.
-
(2004)
The 42nd Annual Southeast Regional Conference ACM Southeast Regional Conference (ACMSE 2004)
, pp. 96-97
-
-
Al-Shurman, M.1
Yoo, S.-M.2
Park, S.3
-
5
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Feb.
-
Y.-C. Hu, A. Perrig, D. B. Johnson, "Wormhole attacks in wireless networks," IEEE Journal on Selected Areas in Communications, vol.24, no.2, pp. 370- 380, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Sept.
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," the 2nd ACM Workshop on Wireless Security, pp. 30-40, Sept. 2003.
-
(2003)
The 2nd ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
24744451603
-
Resisting flooding attacks in ad hoc networks
-
Apr.
-
P. Yi, Z. Dai, Y. Zhong, and S. Zhang, "Resisting flooding attacks in ad hoc networks," International Conference on Information Technology: Coding and Computing 2005 (ITCC 2005), vol.2, pp. 657-662, Apr. 2005.
-
(2005)
International Conference on Information Technology: Coding and Computing 2005 (ITCC 2005)
, vol.2
, pp. 657-662
-
-
Yi, P.1
Dai, Z.2
Zhong, Y.3
Zhang, S.4
-
9
-
-
42749107819
-
A new method to resist flooding attacks in ad hoc networks
-
Sep.
-
S. Li, Q. Liu, H. Chen, and M. Tan, "A new method to resist flooding attacks in ad hoc networks," IEEE Wireless Communications, Networking and Mobile Computing 2006 (WiCOM 2006), pp. 1-4, Sep. 2006.
-
(2006)
IEEE Wireless Communications, Networking and Mobile Computing 2006 (WiCOM 2006)
, pp. 1-4
-
-
Li, S.1
Liu, Q.2
Chen, H.3
Tan, M.4
-
10
-
-
67651053004
-
Packet size based routing for stable data delivery in mobile ad-hoc networks
-
July
-
A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, "Packet size based routing for stable data delivery in mobile ad-hoc networks," IEICE Transactions on Communications, vol.E91-B, no.7, pp. 2244-2254, July 2008.
-
(2008)
IEICE Transactions on Communications
, vol.E91-B
, Issue.7
, pp. 2244-2254
-
-
Khan, A.1
Suzuki, T.2
Kobayashi, M.3
Takita, W.4
Yamazaki, K.5
-
11
-
-
24644452574
-
A novel method of network burst traffic real-time prediction based on decomposition
-
International Conference on Networking (ICN), Apr.
-
X. Yang, Y. Shi, M. Zeng, and R. Zhao, "A novel method of network burst traffic real-time prediction based on decomposition," International Conference on Networking (ICN), Lecture Notes in Computer Science, vol.3420, pp. 784- 793, Apr. 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3420
, pp. 784-793
-
-
Yang, X.1
Shi, Y.2
Zeng, M.3
Zhao, R.4
-
12
-
-
33746614279
-
Maximum lifetime paths for the high packet delivery ratio using fast recover in a mobile ad hoc network
-
International Conference on Computational Science (ICCS 2006), May.
-
H. Kim, S. Han, and J. Song, "Maximum lifetime paths for the high packet delivery ratio using fast recover in a mobile ad hoc network," International Conference on Computational Science (ICCS 2006), Lecture Notes in Computer Science, vol.3992, pp.1101-1104, May. 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3992
, pp. 1101-1104
-
-
Kim, H.1
Han, S.2
Song, J.3
|