1 |
D. Nguyan, L. Zhao, P. Uiswang and J. Plat, 'Security Routing Analysis for Mobile Ad-hoc Networks' Interdisciplinary Telecommunications Program of Colorado Univ, Spring 2000
|
2 |
Sergio Marti and T. J. Giuli and Kevin Lai and Mary Baker, 'Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks', Mobile Computing and Networking, 2000
|
3 |
합참, 군 전술종합정보통신체계 운영 개념서, 2006
|
4 |
Hao Yang, Haijun Luo, Fan Ye, Songwu Lu and Lixia Zhang, 'Security in Mobile Ad-Hoc Networks : Challenges and Solutions', IEEE Wireless Communications, 2004
DOI
ScienceOn
|
5 |
Sonja Buchegger and Jean-Yves Le Boudec, 'Performance Analysis of the CONFIDANT Protocol : Cooperation of Nodes - Fairness in Distributed Ad-hoc NeTworks', In Proceedings of IEEE/ACM Workshop on Mobile Ad-Hoc Networking and Computing(MobiHOC), Lausanne, CH, June 2002
|