共 40 条
[2]
[Anonymous], 2009, ULTRAMODERN TEL WORK
[3]
[Anonymous], 2014, ARXIV14032006
[4]
Basnet R, 2008, STUD FUZZ SOFT COMP, V226, P373, DOI 10.1007/978-3-540-77465-5_19
[5]
Bilge L., 2009, Proceedings of the 18th International Conference on World Wide Web, Security and privacy/session, P551, DOI 10.1145/1526709.1526784
[8]
The anatomy of a large-scale hypertextual Web search engine
[J].
COMPUTER NETWORKS AND ISDN SYSTEMS,
1998, 30 (1-7)
:107-117
[9]
On the detection of clones in sensor networks using random key predistribution
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2007, 37 (06)
:1246-1258
[10]
SET: Detecting node clones in sensor networks
[J].
2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS,
2007,
:341-350