共 8 条
[2]
Hou YT, 2007, 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, P639
[3]
DICAS: Detection, diagnosis and isolation of control attacks in sensor networks
[J].
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS,
2005,
:89-100
[4]
Khalil Issa, 2006, SECURECOMM WORKSHOPS, P1
[5]
Sun Choi, 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08), P343
[6]
Transmission time-based mechanism to detect wormhole attacks
[J].
2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS,
2007,
:172-+
[7]
Wang Weichao., 2004, P ACM WORKSHOP WIREL, P51
[8]
Wang X, 2006, P INT COMP SOFTW APP, P347