Last update: Sun Oct 15 02:37:41 MDT 2017
Top |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Deb:2012:TTB,
author = "Novarun Deb and Nabendu Chaki",
title = "{TIDS}: Trust-Based Intrusion Detection System for
Wireless Ad-hoc Networks",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7564",
pages = "80--91",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-33260-9_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:25:02 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012j.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-33260-9_6/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-33260-9",
book-URL = "http://www.springerlink.com/content/978-3-642-33260-9",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Detection,
7557(0)1,
7559(0)41,
7564(0)135,
7569(0)239,
7578(0)41,
7584(0)22,
7584(0)93,
7584(0)178,
7585(0)11,
7585(0)41,
7585(0)81,
7585(0)111,
7585(0)183,
7590(0)219,
7595(0)220,
7597(0)28,
7597(0)125,
7597(0)178,
7597(0)205,
7597(0)232
- Intrusion,
7597(0)178
- Network,
7552(0)1,
7552(0)33,
7552(0)73,
7552(0)97,
7552(0)113,
7552(0)129,
7552(0)145,
7553(0)17,
7553(0)50,
7553(0)74,
7553(0)100,
7555(0)33,
7557(0)69,
7557(0)79,
7557(0)152,
7558(0)120,
7563(0)51,
7564(0)101,
7572(0)44,
7580(0)109,
7585(0)71,
7585(0)141,
7592(0)192,
7595(0)155,
7595(0)220,
7596(0)1,
7596(0)46,
7596(0)133,
7597(0)42,
7597(0)166
- system,
7550(0)107,
7550(0)137,
7552(0)113,
7554(0)102,
7555(0)142,
7558(0)89,
7562(0)81,
7562(0)187,
7562(0)218,
7564(0)191,
7564(0)224,
7585(0)81,
7590(0)70,
7594(0)164,
7595(0)1,
7595(0)7,
7595(0)59,
7595(0)123,
7595(0)171,
7595(0)252,
7596(0)183,
7597(0)14,
7597(0)57,
7597(0)86,
7597(0)100,
7597(0)125,
7597(0)205
- Wireless,
7596(0)1,
7597(0)42