Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs
暂无分享,去创建一个
[1] Subir Kumar Sarkar,et al. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .
[2] Amit Shrivastava,et al. Overview of Routing Protocols in MANET ’ s and Enhancements in Reactive Protocols , 2005 .
[3] M. Rai,et al. A Novel Review on Routing Protocols in MANETs , 2012 .
[4] Mohammed Mahmoud,et al. THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Comparative Analysis of Routing in MANET , 2014 .
[5] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[6] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[7] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[8] Vrinda Tokekar,et al. Classification of Denial of Service Attacks in Mobile Ad Hoc Networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[9] G. S. Mamatha,et al. Network Layer Attacks and Defense Mechanisms in MANETS- A Survey , 2010 .
[10] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[11] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[12] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[13] Ipsita Panda,et al. A Survey on Routing Protocols of MANETs by Using QoS Metrics , 2012 .
[14] Martin Schütte. Detecting Selfish and Malicious Nodes in MANETs , 2006 .
[15] Marco Conti,et al. Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.
[16] David Jörg,et al. Performance Comparison Of MANET Routing Protocols In Different Network Sizes Computer Science Project , 2004 .
[17] Gaurav Soni,et al. A Nobel Defence Scheme Against Selfish Node Attack in MANET , 2013, ArXiv.
[18] Dharma P. Agrawal,et al. Mobile Ad hoc Networking , 2002 .
[19] OVERVIEW OF VARIOUS ATTACKS IN MANET AND COUNTERMEASURES FOR ATTACKS , 2013 .
[20] G. Sahoo,et al. Mathematical Model for the Detection of Selfish Nodes in MANETs , 2012 .