1 |
O. Kachirski and R. Guha, 'Intrusion Detection Using MObile agents in Wireless Ad Hoc Networks,' Proceedings of the IEEE Workshop on Knowledge Media Networking(KMN '02), pp.153-158, 2002
DOI
|
2 |
L. Venkatraman and D. P. Agrawal, 'A novel authentication in ad hoc networks,' Proceedings of the second IEEE Wireless Communication and Networking Conference, Chicago, September, 2000
DOI
|
3 |
Z. J. Haas and M. R. Pearlman, 'The Performance of Query Control Schemes for the Zone Routing Protocol,' Proceedings of the ACM SIGCOMM, Vancouver, Canada, September, 1998
DOI
|
4 |
L. Sung-Ju, 'Routing and Multicasting Strategies in Wireless Mobile Ad hoc Networks,' University of California, Los Angeles, Ph.D Thesis, Oct., 2000
|
5 |
F. Kevin and V. Kannan, The Network Simulator-NS2, The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, November, 1997, Available from http://www.isi.edu/nsnam/ns
|
6 |
Z. J. Haas and M. R. Realman, 'The Zone Routing Protocol for Ad Hoc Networks,' Internet Draft draft-zone-routing-protocol-01.txt, Aug., 1998
|
7 |
M. R. Pearlman and Z. J. Haas, 'The zone routing protocol(zrp) for ad-hoc networks, Technical report, Internet Draft RFC, November, 1997
|
8 |
M. R. Elizabeth, 'A Review of Current Routing Protocols for Ad Hoc Mobile Wireless,' IEEE Personal Communication, pp.46-55, 1999
DOI
ScienceOn
|
9 |
J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, 'A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,' Proc. of the ACM/IEEE MobiCom, October, 1998
DOI
|
10 |
C. Chinang, 'Routing in Clustered Multihop, Mobile wireless Networks with Fading Channel,' Proceeding of IEEE SICON, April, 1997
|