共 50 条
- [21] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
- [22] An auction based AODV protocol for mobile ad hoc networks with selfish nodes 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3351 - 3356
- [23] Novel Routing Protocol for Mobile Ad hoc Networks with Selfish and Altruistic Nodes 2016 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2016, : 170 - 174
- [24] Detecting Selfish Nodes and Motivating Cooperation in Mobile Ad-hoc Networks 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 301 - 306
- [25] MAC layer anomaly detection in ad hoc networks PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 402 - 409
- [26] Using a cache scheme to detect selfish nodes in mobile ad hoc networks PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 61 - 66
- [27] Multivariate control chart for the detection of MAC layer misbehavior in mobile ad hoc networks 7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 58 - 65
- [29] ON THE OPTIMAL MAC LAYER CAPACITY OF DELAY TOLERANT MOBILE AD HOC NETWORKS WITH A FINITE NUMBER OF NODES 2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 772 - 776
- [30] Access control in ad hoc networks with selfish nodes WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (06): : 761 - 772