An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs
暂无分享,去创建一个
Arputharaj Kannan | Muthuswamy Vijayalakshmi | Sannasi Ganapathy | Sannasy Muthurajkumar | A. Kannan | S. Ganapathy | S. Muthurajkumar | M. Vijayalakshmi
[1] Abdelfettah Belghith,et al. A Multipath Layered Cluster Based Routing for Ad Hoc Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[2] Krishan Kumar,et al. Literature Survey on Power Control Algorithms for Mobile Ad-hoc Network , 2011, Wirel. Pers. Commun..
[3] Ramjee Prasad,et al. Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN) , 2013, Wirel. Pers. Commun..
[4] Frank H. P. Fitzek,et al. Connectivity Probability of Wireless Ad Hoc Networks: Definition, Evaluation, Comparison , 2005, Wirel. Pers. Commun..
[5] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[6] Santosh Nagaraj,et al. Bee System Based Base Station Cooperation Technique for Mobile Cellular Networks , 2017, Wirel. Pers. Commun..
[7] Vladimir Nikulin,et al. Weighted Threshold-Based Clustering for Intrusion Detection Systems , 2006, Int. J. Comput. Intell. Appl..
[8] Lei Li,et al. Two-dimensional trust rating aggregations in service-oriented applications , 2011, IEEE Transactions on Services Computing.
[9] Anupam Das,et al. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Min Luo,et al. An Intrusion Detection Research Based on Spectral Clustering , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Hongyi Wu,et al. Clustering and cluster-based routing protocol for delay-tolerant mobile networks , 2010, IEEE Transactions on Wireless Communications.
[12] Jie Wu,et al. Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.
[13] Yixian Yang,et al. A Cluster-Based Trust Model for Mobile Ad Hoc Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[14] Mauro De Sanctis,et al. Energy Efficient Wireless Networks Towards Green Communications , 2011, Wirel. Pers. Commun..
[15] Arputharaj Kannan,et al. Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.
[16] Meng Jianliang,et al. The Application on Intrusion Detection Based on K-means Cluster Algorithm , 2009, 2009 International Forum on Information Technology and Applications.
[17] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[18] Luiz Fernando Sirotheau Serique,et al. Evaluating Trust in Ad Hoc Network Routing by Induction of Decision Trees , 2012 .
[19] Daeyoung Park,et al. Coordinating transmit power and carrier phase for wireless networks with multi-packet reception capability , 2013, EURASIP J. Wirel. Commun. Netw..
[20] Zheng Yan,et al. Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.
[21] Ramjee Prasad,et al. Energy-Efficient and Improved eWALL: e2WALL , 2017, Wirel. Pers. Commun..