共 103 条
- [1] Abduvaliyev A., 2010, 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), P25, DOI 10.1109/ICEIE.2010.5559708
- [2] Intrusion detection in sensor networks: A non-cooperative game approach [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 343 - 346
- [3] Al Ahmad Mahmoud, 2020, Progress in Computing, Analytics and Networking. Proceedings of ICCAN 2019. Advances in Intelligent Systems and Computing (AISC 1119), P567, DOI 10.1007/978-981-15-2414-1_57
- [4] Energy Efficient Virtual Machines Placement Over Cloud-Fog Network Architecture [J]. IEEE ACCESS, 2020, 8 (08): : 94697 - 94718
- [5] Alrawashdeh K, 2016, 2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), P195, DOI [10.1109/ICMLA.2016.167, 10.1109/ICMLA.2016.0040]
- [6] A Novel Coding Scheme to Implement Signature based IDS in IP based Sensor Networks [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 269 - +
- [7] Amiri M., 2010, Ph.D. Thesis
- [8] Anita SC, 2015, 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), P190, DOI 10.1109/ICGCIoT.2015.7380455
- [9] [Anonymous], 2005, P 1 ACM INT WORKSH Q
- [10] [Anonymous], 2007, P 4 WORKSH EMB NETW