Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Xiao, Yanping
Lin, Chuang
Jiang, Yixin
Chu, Xiaowen
and
Wang, Shengling
2009.
Quality of Service in Heterogeneous Networks.
Vol. 22,
Issue. ,
p.
34.
Di Renzo, Marco
and
Debbah, Merouane
2009.
Wireless physical-layer security: The challenges ahead.
p.
313.
Ramrekha, Tipu Arvind
and
Politis, Christos
2009.
Mobile Lightweight Wireless Systems.
Vol. 13,
Issue. ,
p.
74.
Bouabana-Tebibel, Thouraya
Mehar, Sara
and
Guibadj, Rym Nesrine
2010.
Secure information exchange.
p.
59.
Xu Lijun
Gao Guohong
Wang Yingjun
and
Lv Jinna
2010.
Study on battery power optimization method for wireless Ad hoc networks.
p.
390.
Gupta, P
and
Saxena, P
2010.
Energy Consumption in Wireless Ad Hoc Network.
p.
831.
Gohari, Amir Aminzadeh
Pakbaz, Ryan
Melliar-Smith, P. Michael
Moser, Louise E.
and
Rodoplu, Volkan
2011.
RMR: Reliability Map Routing for Tactical Mobile Ad Hoc Networks.
IEEE Journal on Selected Areas in Communications,
Vol. 29,
Issue. 10,
p.
1935.
Bouabana-Tebibel, Thouraya
2011.
A collaborative approach to secure ad hoc routing protocols.
p.
1.
Bouabana-Tebibel, Thouraya
2012.
Trusted Systems.
Vol. 7222,
Issue. ,
p.
258.
Mishra, Amitabh
and
Masson, Gerald
2012.
MoCCA: A mobile cellular cloud architecture.
p.
1.
Ochola, E. O.
Eloff, M. M.
and
van der Poll, J. A.
2013.
The failure of watchdog schemes in MANET security.
p.
305.
Guo, Jiwen
Zhou, Xianwei
Yuan, Junling
and
Xu, Haitao
2013.
Secure Access Control Guarding Against Internal Attacks in Distributed Networks.
Wireless Personal Communications,
Vol. 68,
Issue. 4,
p.
1595.
Gohari, Amir Aminzadeh
and
Rodoplu, Volkan
2013.
Congestion-Aware Spatial Routing in Hybrid High-Mobility Wireless Multihop Networks.
IEEE Transactions on Mobile Computing,
Vol. 12,
Issue. 11,
p.
2247.
Ochola, EO
Eloff, MM
and
van der Poll, JA
2013.
Democratic detection of malicious behaviour in MANET: A voting process.
p.
1.
Lotfy, P. A.
and
Azer, M. A.
2013.
Performance evaluation of AODV under dos attacks.
p.
1.
Chadli, Sara
Saber, Mohammed
and
Ziyyat, Abdelhak
2014.
Defining categories to select representative attack test-cases in MANETs.
p.
855.
Chadli, Sara
Saber, Mohammed
and
Ziyyat, Abdelhak
2014.
Defining Categories to Select Representative Attack Test-Cases in MANETs.
p.
658.
Taheri, M.
2015.
Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR).
International Journal of Information and Electronics Engineering,
Ferdous, Raihana
and
Muthukkumarasamy, Vallipuram
2016.
A Comparative Performance Analysis of MANETs Routing Protocols in Trust-Based Models.
p.
880.
Kumar, Sunil
and
Dutta, Kamlesh
2016.
Securing Mobile Ad Hoc Networks.
International Journal of Handheld Computing Research,
Vol. 7,
Issue. 1,
p.
26.