共 12 条
- [1] [Anonymous], 2012, TECHNICAL REPORT
- [2] [Anonymous], 2003, AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00003-9
- [4] Ciciriello P, 2007, LECT NOTES COMPUT SC, V4373, P34
- [5] Clausen T., 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2010), P7, DOI 10.1109/ISSNIP.2010.5706795
- [6] False Positive Analysis of software vulnerabilities using Machine learning [J]. 2018 SEVENTH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2018, : 3 - 6
- [7] Hof H.-J., 2007, Algorithms for Sensor and Ad Hoc Networks, P1
- [9] Varga A., 2010, Modeling and Tools for Network Simulation, P35, DOI [10.1007/978-3-642-12331-3_3/COVER, DOI 10.1007/978-3-642-12331-3_3/COVER, 10.1007/978-3-642-12331-3_3]
- [10] Wu FJ, 2009, MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, P293, DOI 10.1109/MDM.2009.43