Security and trust in opportunistic networks - A survey
Version 2 2024-06-05, 10:44Version 2 2024-06-05, 10:44
Version 1 2016-10-26, 00:00Version 1 2016-10-26, 00:00
journal contribution
posted on 2024-06-05, 10:44 authored by M Alajeely, Robin Ram Mohan DossRobin Ram Mohan Doss, A AhmadSecurity and trust in opportunistic networks - A survey
History
Related Materials
- 1.
Location
Abingdon, Eng.Language
EnglishPublication classification
C Journal article, C1 Refereed article in a scholarly journalCopyright notice
2015, IETEJournal
IETE Technical ReviewVolume
33Pagination
256-268ISSN
0256-4602eISSN
0974-5971Issue
3Publisher
Taylor & FrancisUsage metrics
Categories
No categories selectedKeywords
AD-HOC NETWORKSATTACKSDELAY-TOLERANT NETWORKSdenial-of-service attackDTNEngineeringEngineering, Electrical & ElectronicESTABLISHMENTMANAGEMENTMISBEHAVIORopportunistic networksrouting protocolsSCHEMEScience & TechnologysecurityTechnologyTelecommunicationstrust080303 Computer System Security970108 Expanding Knowledge in the Information and Computing SciencesSchool of Information Technology4604 Cybersecurity and privacy4612 Software engineering
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

