[1] |
周欣欣, 余镇危 . 基于情景感知的移动 Ad Hoc 网络自适应路由协议[J]. 计算机工程与设计, 2014,35(11):3799-3904. ZHOU X X , YU Z W . Adaptive routing protocol based on context-aware for mobile Ad Hoc networks[J]. Computer Engineering and Design, 2014,35(11):3799-3904.
|
[2] |
卜飞飞, 邬春学 . 一种针对AODV协议黑洞攻击的检测策略[J]. 计算机应用与软件, 2015,32(5):273-277. BU F F , WU C X . A detection strategy for black hole attack based on AODV[J]. Computer Applications and Software, 2015,32(5):273-277.
|
[3] |
葛洁莉, 刘渊 . 一种抵御虫洞攻击的WSN 定位算法[J]. 计算机与现代化, 2015(8):61-66. GE J L , LIU Y . A WSN location algorithm against wormhole attacks[J]. JComputer and Modernization, 2015(8):61-66.
|
[4] |
温聪源, 徐守萍 . 基于改进动态源路由协议的 MANET 灰洞攻击检测和缓解研究[J]. 科学技术与工程, 2014,14(29):54-60. WEN C Y , XU S P . The research of detecting and mitigating gray hole attacks in MANET based on modified dynamic source routing protocol[J]. Science Technology and Engineering, 2014,14(29):54-60.
|
[5] |
靳倩慧, 姚国祥, 李佩 . MANET 分簇IDS 报文丢弃攻击全局感知方案[J]. 微型机与应用, 2011,30(17):49-53. JIN Q H , YAO G X , LI P . A scheme of globally detecting packet dropping attacks for clustering IDS in MANET[J]. Microcomputer and Application, 2011,30(17):49-53.
|
[6] |
钟飞, 钟毓宁 . Mamdani与Sugeno型模糊推理的应用研究[J]. 湖北工业大学学报, 2005,20(2):27-30. ZHONG F , ZHONG Y N . The application research of Mamdani and Sugeno style fuzzy inference[J]. Journal of Hubei University of Technology, 2005,20(2):27-30.
|
[7] |
SAMEEKSHA J , AMIT J . Survey on intrusion detection system for wireless Ad Hoc network[J]. International Journal of Computer Applications, 2015,120(4): 14-19.
|
[8] |
LEANDROS A M . A novel distributed intrusion detection system for vehicular ad hoc networks[J]. International Journal of Advanced Computer Science and Applications, 2015,6(4): 101-106.
|
[9] |
陈丹伟, 黄秀丽, 任勋益 . 基于人工神经网络入侵检测模型的探讨[J]. 计算机技术与发展, 2009,19(12):143-145. CHEN D W , HUANG X L , REN X Y . An approach to IDS model based on artificial neuron networks[J]. Computer Technology and Development, 2009,19(12):143-145.
|
[10] |
刘道群, 孙庆和 . 基于遗传神经网络的入侵检测模型[J]. 激光杂志, 2005,26(6):73-75. LIU D Q , SUN Q H . Intrusion detection method based on genetic algorithm and neural network[J]. Laser Journal, 2005,26(6):73-75.
|
[11] |
马海峰, 孙名松 . 基于多层前向神经网络入侵检测系统的研究[J]. 哈尔滨理工大学学报, 2004,9(2):52-55. MA H F , SUN M S . Study of intrusion detection system based on multiplayer forward neural network[J]. Journal of Harbin University of Science and Technology, 2004,9(2):52-55.
|
[12] |
李向远, 张章, 李杨 . 基于QualNet的一种分布式空中骨干网的研究与设计[J]. 舰船电子工程, 2015,35(5):43-46. LI X Y , ZHANG Z , LI Y . Research and design of distributed air backbone network based on QualNet[J]. Ship Electronic Engineering, 2015,35(5):43-46.
|
[13] |
王桐 . 一种新的无线网络信号干扰累加捕获模型[J]. 南京师范大学学报(工程技术版), 2015,15(2):73-76. WANG T . A new capture model based on cumulative signal interference for wireless ad hoc networks[J]. ournal of Nanjing Normal University(Engineering and Technology Edition), 2015,15(2):73-76.
|
[14] |
石柯, 陈洪生, 张仁同 . 一种基于支持向量回归的802.11无线室内定位方法[J]. 软件学报, 2014,25(11):2636-2651. SHI K , CHEN H S , ZHANG R T . Indoor location method based on support vector regression in 802.11 wireless environments[J]. Journal of Software, 2014,25(11):2636-2651.
|
[15] |
李晖 . 移动容迟网络中基于改进随机路点模型的移动连接路由[J]. 吉林大学学报(工学版), 2011,41(S1):297-303. LI H . Mobile connection routing under modified random waypoint models in delay tolerant mobile networks[J]. Journal of Jilin University (Engineering Edtion), 2011,41(S1):297-303.
|
[16] |
SIMAREMATE H , SYARIF A . ABOUAISSA A. Energy consumption analysis of modified AODV routing protocol under random waypoint and reference point group mobility models[C]// International Conference on Advanced Computer Science andInformation Systems, Dec 1-2,2012, Jakarta, Indonesia. New Jersey:IEEE Press, 2012.
|
[17] |
刘侠, 肖英杰, 吴华锋 . 联合无线资源管理技术的改进型垂直切换算法[J]. 电子技术应用, 2014,40(2):97-100. LIU X , XIAO Y J , WU H F . An improved vertical handoff algorithm of joint radio resource management[J]. Application of Electronic Technique, 2014,40(2):97-100.
|
[18] |
彭蜜 . 像素方向分布不一致性的图像模糊取证方法[J]. 电子技术应用, 2014,40(4):63-69. PENG M . Blurring detection in image forensics based on pixels direction inconsistency[J]. Application of Electronic Technique, 2014,40(4):63-69.
|