Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET
暂无分享,去创建一个
[1] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[2] Brij B. Gupta,et al. An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET) , 2014 .
[3] Anupam Joshi,et al. Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..
[4] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[5] Zhu Han,et al. Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[6] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Muthumanickam Gunasekaran,et al. TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks , 2013, IET Inf. Secur..
[8] S. Aravindh,et al. A TRUST BASED APPROACH FOR DETECTION AND ISOLATION OF MALICIOUS NODES IN MANET , 2013 .
[9] Patricia Morreale,et al. Design of a Mobile Ad Hoc Network Communication App for Disaster Recovery , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[10] Hirokazu Suzuki,et al. An Ad Hoc Network in the Sky, SKYMESH, for Large-Scale Disaster Recovery , 2006, IEEE Vehicular Technology Conference.