1 |
Y. Huang and W. Leem "A Cooperative Intrusion Detection System for Ad Hoc Networks." Pro. of the ACM Workshop on Security in Ad hoc and Sensor Networks. Fairfax, VA. USA. 2003.
|
2 |
MAINAK CHATTETJEE, SAJAL K. DAS and DAMLA TURGUT, "WCA: A Weighted Clustering Algorithm for Mobile AD Hoc Networks", Cluster Computing 5, pp.193-204, 2002
DOI
ScienceOn
|
3 |
Sung-Gook Lim, Hun-je Yeon, JaiYong Lee "Adaptive Clusterhead Positioning for Muti-hop Ad-hoc Networks" JCCI 2006
|
4 |
Y Kim, A Helmy, "Attacker Tracevack With Cross-layer Monitoring in Wireless Multi-hop Networks." SASN, Oct. 2006
|
5 |
I1 yong Kim, Ki Chang Kim, "A Resource-efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter." ICCIT. Nov. 2008
|
6 |
yatagai, Iwao sasase, m_ishii, "Hierarchical traceback method using clustering for mobile ad hoc networks", PIMRC IEEE. PP. 2623-2627, 2009
|
7 |
Yongjin Kim, Ahmed Helmy, "SWAT : Small World-based Attacker Traceback in ad-hoc Networks." MOBIQUITOUS, Jul. 2005
|
8 |
yi-sn husng, wenke Lee. "hotspot-Based for Mobile Ad-hoc Networks," ACM Pro. of the 4th ACM workshop on wireleess security. pp. 43-54. Sept. 2005
|
9 |
Geun-Bin Hong, Ji-hun Yun, Kwan-Woong Kim, "Study of the Wireless Ad-hoc Networks with Robust Route Maintenance Scheme." KIIECT vol.3, no.2, pp.46-49, Jun. 2010.
|
10 |
In-ho Yeo, Hyo-sik Yang, Jong-Myung Rhee "Impacts of Radio Propagation Model on Mobile Ad-hoc Network (MANET) Performance in Group Mobility Environments" KIIECT vol.3, no.3, pp.62-72, Sep. 2010.
|