29
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Detection method of boundary malicious nodes in computer network

Pages 1429-1433 | Received 01 Mar 2017, Published online: 20 Dec 2017

References

  • Z. F. Zhang, L. Tang, G. W. Yang. Study and simulation of malicious node automatic detection in Mobile Network. Computer Simulation, 33(2016) 293–296.
  • L. Ma, J. Liu, B. Duan et al. A theoretical estimation for the optimal network robustness measure R against malicious node attacks. Epl, 111(2015) 28–33.
  • T. Hynek, J. Sykora. Wireless physical layer network coding in potential presence of malicious relays–incomplete information game approach. Electronics Letters, 51(2015) 1292–1294. doi: 10.1049/el.2015.0832
  • K. Zaidi, M. Milojevic, V. Rakocevic et al. Host Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection. IEEE Transactions on Vehicular Technology, 20(2015) 1–2.
  • M. J. Faghihniya, S. M. Hosseini, M. Tahmasebi. Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wireless Networks, 20(2016) 1–12.
  • R. Ahmed, M. E. Sayed, S. A. Gadsden, et al. Automotive Internal-Combustion-Engine Fault Detection and Classification Using Artificial Neural Network Techniques. IEEE Transactions on Vehicular Technology, 64(2015) 21–33. doi: 10.1109/TVT.2014.2317736
  • A. Parrinello, P. Mantegazza.: Improvements and Extensions to a Full-Potential Formulation Based on Independent Fields. Aiaa Journal, 50(2015) 571–580. doi: 10.2514/1.J051270

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.