Citation to this article as recorded by
Chen, J.B., 2012. Implementation and evaluation of the live-CD based authentication gateway. Inform. Technol. J., 11: 1327-1331. CrossRefDirect Link |
Lee, S., Y. Lee and S.G. Yoo, 2012. A specification based intrusion detection mechanism for the LEACH protocol. Inform. Technol. J., 11: 40-48. CrossRefDirect Link |
Citation to this article as recorded by
Application of Piecewise Linear Approximation of the UAV Trajectory for Adaptive Routing in FANET Advances in Science, Technology and Engineering Systems Journal Vol. 6, Issue 2, 559, 2021 |
A Specification Based Intrusion Detection Mechanism for the LEACH Protocol Information Technology Journal Vol. 11, Issue 1, 40, 2012 |
How to cite this article
Hsien-Chou Liao, Yi-Wei Ting, Chia-Meng Chen and Chou-Chen Yang, 2005. A Performance Comparison of Ad Hoc Routing Protocols Based on Ant Mobility Model. Information Technology Journal, 4: 278-283.
DOI: 10.3923/itj.2005.278.283
URL: https://scialert.net/abstract/?doi=itj.2005.278.283
DOI: 10.3923/itj.2005.278.283
URL: https://scialert.net/abstract/?doi=itj.2005.278.283