Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Xiao, Yanping
Lin, Chuang
Jiang, Yixin
Chu, Xiaowen
and
Wang, Shengling
2009.
Quality of Service in Heterogeneous Networks.
Vol. 22,
Issue. ,
p.
34.
Di Renzo, Marco
and
Debbah, Merouane
2009.
Wireless physical-layer security: The challenges ahead.
p.
313.
Ramrekha, Tipu Arvind
and
Politis, Christos
2009.
Mobile Lightweight Wireless Systems.
Vol. 13,
Issue. ,
p.
74.
Xu Lijun
Gao Guohong
Wang Yingjun
and
Lv Jinna
2010.
Study on battery power optimization method for wireless Ad hoc networks.
p.
390.
Bouabana-Tebibel, Thouraya
Mehar, Sara
and
Guibadj, Rym Nesrine
2010.
Secure information exchange.
p.
59.
Gupta, P
and
Saxena, P
2010.
Energy Consumption in Wireless Ad Hoc Network.
p.
831.
Bouabana-Tebibel, Thouraya
2011.
A collaborative approach to secure ad hoc routing protocols.
p.
1.
Gohari, Amir Aminzadeh
Pakbaz, Ryan
Melliar-Smith, P. Michael
Moser, Louise E.
and
Rodoplu, Volkan
2011.
RMR: Reliability Map Routing for Tactical Mobile Ad Hoc Networks.
IEEE Journal on Selected Areas in Communications,
Vol. 29,
Issue. 10,
p.
1935.
Mishra, Amitabh
and
Masson, Gerald
2012.
MoCCA: A mobile cellular cloud architecture.
p.
1.
Bouabana-Tebibel, Thouraya
2012.
Trusted Systems.
Vol. 7222,
Issue. ,
p.
258.
Ochola, EO
Eloff, MM
and
van der Poll, JA
2013.
Democratic detection of malicious behaviour in MANET: A voting process.
p.
1.
Gohari, Amir Aminzadeh
and
Rodoplu, Volkan
2013.
Congestion-Aware Spatial Routing in Hybrid High-Mobility Wireless Multihop Networks.
IEEE Transactions on Mobile Computing,
Vol. 12,
Issue. 11,
p.
2247.
Ochola, E. O.
Eloff, M. M.
and
van der Poll, J. A.
2013.
The failure of watchdog schemes in MANET security.
p.
305.
Lotfy, P. A.
and
Azer, M. A.
2013.
Performance evaluation of AODV under dos attacks.
p.
1.
Guo, Jiwen
Zhou, Xianwei
Yuan, Junling
and
Xu, Haitao
2013.
Secure Access Control Guarding Against Internal Attacks in Distributed Networks.
Wireless Personal Communications,
Vol. 68,
Issue. 4,
p.
1595.
Chadli, Sara
Saber, Mohammed
and
Ziyyat, Abdelhak
2014.
Defining Categories to Select Representative Attack Test-Cases in MANETs.
p.
658.
Chadli, Sara
Saber, Mohammed
and
Ziyyat, Abdelhak
2014.
Defining categories to select representative attack test-cases in MANETs.
p.
855.
Taheri, M.
2015.
Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR).
International Journal of Information and Electronics Engineering,
Ochola, E O
Eloff, M M
and
van der Poll, J A
2016.
Beyond watchdog schemes in securing MANET's reactive protocols operating on a dynamic transmission power control technique.
p.
637.
Ferdous, Raihana
and
Muthukkumarasamy, Vallipuram
2016.
A Comparative Performance Analysis of MANETs Routing Protocols in Trust-Based Models.
p.
880.