暂无分享,去创建一个
[1] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[2] Marco Conti,et al. Reliable and efficient forwarding in ad hoc networks , 2006, Ad Hoc Networks.
[3] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[4] Ratul Mahajan,et al. Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.
[5] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[6] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[7] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[8] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Dharma P. Agrawal,et al. Selfishness in mesh networks: wired multihop MANETs , 2008, IEEE Wireless Communications.
[10] Younghwan Yoo,et al. Distributed Self-policing Architecture for Fostering Node Cooperation in Wireless Mesh Networks , 2006, PWC.
[11] Jaydip Sen,et al. An Efficient and Reliable Routing Protocol for Wireless Mesh Networks , 2010, ICCSA.
[12] Pang-Ning Tan,et al. Distributed Detection of Selfish Routing in Wireless Mesh Networks , 2007 .
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Hyun Jin Kim,et al. Detecting Selfish Behavior in a Cooperative Commons , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[15] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.