1 |
Anjum, S. S., Md Noor, R., & Anisi, M. H., "Review on MANET based communication for search and rescue operations," Wireless Personal Communications, Vol.94, pp.31-52, 2017.
DOI
|
2 |
Chatterjee P, Ghosh U, Sengupta I, Ghosh SK , "A trust enhanced secure clustering framework for wireless ad hoc networks," Springer Wireless Networks, Vol.20, No.7, pp.1669-1684, 2014.
DOI
|
3 |
Fleury, M., Kanellopoulos, D., & Qadri, N. N, "Video streaming over MANETs: An overview of techniques. Multimedia Tools and Applications," pp.23749-23782, 2019.
DOI
|
4 |
Moussaoui, A., & Boukeream, A., "A survey of routing protocols based on link-stability in mobile ad hoc networks," Journal of Network and Computer Applications, Vol.47, pp.1-10, 2015.
DOI
|
5 |
Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J., "Security in wireless ad-hoc networks-A survey," Computer Communications Journal, Vol.51, pp.1-20, 2014.
DOI
|
6 |
Il Yong Kim and Ki Chang Kim, "A Resource-efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter," ICCIT. Nov. 2008.
|
7 |
K. Park and H. Lee, "On the Effectiveness of Route-based Packet Filtering for Ditributed DoS Attack Prevention in Power-Law Internet," Proc. ACM SIGCOMM'01, pp.15-26, 2001.
|