共 13 条
- [1] Gurjar A., Patial A.R., Evaluating the privacy measure of the source location privacy scheme in a wireless sensor network, Int J Comput Eng Res, 3, pp. 10-13, (2013)
- [2] Dong M., Ota K., Liu A., Preserving source-location privacy through redundant fog loop for wireless sensor networks, pp. 1835-1842, (2015)
- [3] Li Y., Ren J., Source-location privacy through dynamic routing in wireless sensor networks, pp. 1-9, (2010)
- [4] Moe M.E.G., Quantification of anonymity for mobile ad hoc networks, Electron Notes Theor Comput Sci, 244, pp. 95-107, (2009)
- [5] Zhu X., Guo H., Liang S., Et al., An improved security-aware packet scheduling algorithm in real-time wireless networks, Inf Process Lett, 112, 7, pp. 282-288, (2012)
- [6] Qin X., Alghamdi M., Nijim M., Et al., Improving security of real-time wireless networks through packet scheduling [transactions letters], IEEE Trans Wirel Commun, 7, 9, (2008)
- [7] Novotny P., Wolf A.L., Ko B.J., Discovering service dependencies in mobile ad hoc networks, pp. 527-533, (2013)
- [8] Wang S., Capretz M.A., A dependency impact analysis model for web services evolution, pp. 359-365, (2009)
- [9] Lawrence E., Michailidis G., Nair V., Et al., Network tomography: a review and recent developments, Ann Arbor, 1001, 48, pp. 109-1107, (2006)
- [10] Tati S., Novotny P., Ko B.J., Et al., Performance diagnosis of services in scalable and dynamic networks, System, 5, (2011)