Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 414-416.
• Information Security • Previous Articles Next Articles
LIANG Tao1, WANG Tong-xiang 2, LIU Jian-wei2, YANG Jing3
CLC Number:
[1]王雪霞,张泽琦,李明,等.一种基于入侵检测的空间网络安全路由技术[J].电子技术应用,2015,41(4):101-104. [2]WEI X,WANG Q,WANG T,et al.Jammer localization inmulti-hop wireless network:A comprehensive survey[J].IEEE Communications Surveys & Tutorials,2016,19(2):765-799. [3]FENG J E,PASILIAO L,DIXON W,et al.An optimal jamming strategy to partition a wireless network[C]∥Military Communications Conference.Milcom,2015. [4]GEZICI S,GHOLAMI M,BAYRAM S,et al.Optimal jamming of wireless localization systems[C]∥IEEE International Confe-rence on Communication Workshop.2015:2660-2676. [5]AMURU S,TEKIN C,VAN M,et al.Buehrer.A systematic learning method for optimal jamming[C]∥IEEE International Conference on Communications.2015:2822-2827. [6]BAYRAKTAROGLU E,KING C,LIU X,et al.Performance of IEEE 802.11 under jamming[J].Mobile Networks & Applications,2013,18(5):678-696. [7]BIANCHI G.Performance analysis of the IEEE 802.11 distributed coordination function[J].IEEE Journal on Selected Areas in Communications,2000,18:535-547. [8]CARVALHO M,GARCIALUNAACEVES S J.Delay Analysis of IEEE 802.11 in Single-Hop Networks[C]∥Proceedings of 11th IEEE International Conference on Network Protocals.IEEE,2003:146-155. |
[1] | GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110. |
[2] | . Per-flow Admission Control with Adaptive Reservation of Bandwidth and Multiple QoS [J]. Computer Science, 2012, 39(8): 130-135. |
|