-
1
-
-
84863376110
-
Discovering AODV-based multipath routes in wireless ad hoc networks
-
Li G, Sun H. Discovering AODV-based multipath routes in wireless ad hoc networks. Security Comm. Networks 2012; 5: 374–383. DOI:10.1002/sec.322.
-
(2012)
Security Comm. Networks
, vol.5
, pp. 374-383
-
-
Li, G.1
Sun, H.2
-
2
-
-
34547542028
-
A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet
-
Ammari HM. A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet. International Journal of Communication Systems 2007; 20: 943–968. DOI:10.1002/dac.854.
-
(2007)
International Journal of Communication Systems
, vol.20
, pp. 943-968
-
-
Ammari, H.M.1
-
4
-
-
84899957360
-
Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation
-
Pouyan A, Yadollahzadeh Tabari M. Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation. International Journal of Engineering 2014; 7(5): 739–746.
-
(2014)
International Journal of Engineering
, vol.7
, Issue.5
, pp. 739-746
-
-
Pouyan, A.1
Yadollahzadeh Tabari, M.2
-
6
-
-
84863111146
-
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
-
Malekzadeh M, Ghani AAA, Subramaniam S. A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. International Journal of Communication Systems 2012; 25: 903–925. DOI:10.1002/dac.1296.
-
(2012)
International Journal of Communication Systems
, vol.25
, pp. 903-925
-
-
Malekzadeh, M.1
Ghani, A.A.A.2
Subramaniam, S.3
-
13
-
-
85005973117
-
Outlier detection in wireless sensor networks using distributed principal component analysis
-
Ahmadi Livani M, Alikhany M, Abadi M, Yadollahzadeh Tabari M. Outlier detection in wireless sensor networks using distributed principal component analysis. Journal of AI and Data Mining 2013; 1(1): 1–11.
-
(2013)
Journal of AI and Data Mining
, vol.1
, Issue.1
, pp. 1-11
-
-
Ahmadi Livani, M.1
Alikhany, M.2
Abadi, M.3
Yadollahzadeh Tabari, M.4
-
15
-
-
84875234781
-
A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
-
He D, Chen C, Ma M, Chan S, Bu J. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks. International Journal of Communication Systems 2013; 26: 495–504. DOI:10.1002/dac.1355.
-
(2013)
International Journal of Communication Systems
, vol.26
, pp. 495-504
-
-
He, D.1
Chen, C.2
Ma, M.3
Chan, S.4
Bu, J.5
-
17
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
In, n/d, Paris, France
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM. A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), n/d: Paris, France, 2002; 78–89.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP)
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
19
-
-
74949096170
-
SEAODV: Secure efficient AODV routing protocol for MANETs networks
-
In, Seoul, Korea
-
Mohammadizadeh M, Movaghar A, SafiS M. SEAODV: Secure efficient AODV routing protocol for MANETs networks. In Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS), Seoul, Korea, 2009; 940–44.
-
(2009)
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS)
, pp. 940-944
-
-
Mohammadizadeh, M.1
Movaghar, A.2
SafiS, M.3
-
22
-
-
84892490580
-
Performance study of a wireless mobile ad hoc network with orientation-dependent internode communication scheme
-
Kostin A, Oz G, Haci H. Performance study of a wireless mobile ad hoc network with orientation-dependent internode communication scheme. International Journal of Communication Systems 2014; 27: 322–340.
-
(2014)
International Journal of Communication Systems
, vol.27
, pp. 322-340
-
-
Kostin, A.1
Oz, G.2
Haci, H.3
-
25
-
-
4143137391
-
Modelling and performance analysis of a novel position based reliable unicast and multicast routing method using coloured Petri nets
-
Erbas F, Kyamakya K, Jobmann K. Modelling and performance analysis of a novel position based reliable unicast and multicast routing method using coloured Petri nets. IEEE Communications Society, Globecom 2004 Workshops.
-
IEEE Communications Society, Globecom 2004 Workshops
-
-
Erbas, F.1
Kyamakya, K.2
Jobmann, K.3
-
26
-
-
60249103582
-
A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets
-
Tzu-Chiang C, Cheng-Feng T, Ting-Wei H. A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets. Expert Systems with Applications 2009; 36: 8115–8123.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 8115-8123
-
-
Tzu-Chiang, C.1
Cheng-Feng, T.2
Ting-Wei, H.3
-
33
-
-
0032186636
-
Parsec: a parallel simulation environment for complex systems
-
Bagrodia R, Meyer R, Takai M. Parsec: a parallel simulation environment for complex systems. IEEE Computer 1998; 31: 77–85.
-
(1998)
IEEE Computer
, vol.31
, pp. 77-85
-
-
Bagrodia, R.1
Meyer, R.2
Takai, M.3
-
34
-
-
78650394299
-
Trust-based on-demand multipath routing in mobile ad hoc networks
-
Li X, Jia Z, Zhang P, Zhang R, Wang H. Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security 2010; 4: 212–232.
-
(2010)
IET Information Security
, vol.4
, pp. 212-232
-
-
Li, X.1
Jia, Z.2
Zhang, P.3
Zhang, R.4
Wang, H.5
-
35
-
-
82455219325
-
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory
-
Xia H, Jia1 Z, Ju L, Zhu Y. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 2011; 1: 248–266.
-
(2011)
IET Wirel. Sens. Syst.
, vol.1
, pp. 248-266
-
-
Xia, H.1
Jia, Z.2
Ju, L.3
Zhu, Y.4
|