共 17 条
[1]
Abdullah Md Ibrahim, 2015, International Journal of Computer Network and Information Security, V7, P50, DOI 10.5815/ijcnis.2015.03.07
[2]
[Anonymous], 2015, INDIAN J SCI TECHNOL, DOI DOI 10.17485/ijst/2015/v8iS2/57793
[3]
Byung GC, 2008, 2009 INT C INF NETW
[4]
Chanatip T, 2010, 2009 7 INT C INF COM
[5]
Chen C, 2010, IEEE INT C
[6]
Dallas Daniel, 2007, 2007 15th IEEE International Conference on Networks, P176, DOI 10.1109/ICON.2007.4444082
[8]
Jain S., 2021, Healthcare paradigms in the internet of things ecosystem, P1, DOI DOI 10.1016/B978-0-12-819664-9.00001-6
[9]
Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side
[J].
2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB),
2008,
:526-531
[10]
Luigi C, 2010, 2010 5 INT C CRIT IN

