Computer Science ›› 2015, Vol. 42 ›› Issue (3): 144-147.doi: 10.11896/j.issn.1002-137X.2015.03.030
Previous Articles Next Articles
NI Ming, ZHANG Hong and LI Qian-mu
[1] Zhang Yong-guang,et al.Intrusion Detection in Wireless Ad hocNetworks[C]∥Proc.of the 6th Annual ACM/ IEEE International Conference on Mobile Computing and Networking.Boston:ACM Press,2000:275-283 [2] Kachirski O,Guha R.Effective Intrusion Detection Using Multiple Sensors in Wireless Sensor Networks [C]∥Proc.of the 36th Hawaii International Conference on System Science.Hawaii,2003:102-110 [3] Venkatraman L,Aagrawal D P.Strategies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks[J].Journal of Parallel and Distributed Computing,2003,63(2):214-227 [4] Gomez J,Campbell A T.PARO:Supporting dynamic power controlled routing in wireless Ad Hoc networks[J].ACM/Kluwer J.Wireless Networks,2003,9(5):443-460 [5] Toh C-K.Maximum battery life routing to support ubiquitous mobile computing in wireless Ad hoc networks[J].IEEE Communicating Magazine,2001(6):2-11 [6] Rodoplu V,Meng T.Minimum energy mobile wireless networks[J].IEEE Journal on Selected Areas in Communications, 1999,17(8):1333-1344 [7] Wattenhofer T.Distributed topology control for power efficient operation in multihop Ad Hoc networks[C]∥Proc.IEEE INFOCM Conf..2001:1388-1397 [8] Rappaport S.Wireless communications:principles and practice[M]∥Upper Saddle River.NJ:Prentice Hall,1995:72-75 [9] Bae S H,Lee S J,Su W,et al.The design,implementation andperformance evaluation of the on demand multicast routing protocols in multihop wireless networks[J].IEEE Network,2000,14(1):70-77 [10] Li Qian-mu.Multiple QoS Constraints Finding Paths Algorithm in TMN[J].Journal of Information,2011,4(3):223-231 [11] Li Qian-mu,Yin Jie.A Service Access Security Control Model in Cyberspace[C]∥Intelligent Computing and Information Science(ICICIS2011).2011,134:418-426 [12] 王芳,易平,等.基于规范的移动Ad hoc网络分布式入侵检测[J].计算机科学,2010,37(10):118-122 |
No related articles found! |
|