共 19 条
[1]
Ensuring Availability of Wireless Mesh Networks for Crisis Management
[J].
INTELLIGENT DISTRIBUTED COMPUTING XII,
2018, 798
:344-353
[2]
Modeling and Analysis of IoT Energy Resource Exhaustion Attacks
[J].
INTELLIGENT DISTRIBUTED COMPUTING XI,
2018, 737
:263-270
[3]
Desnitsky VA, 2019, IEEE NW RUSS YOUNG, P214, DOI [10.1109/EIConRus.2019.8656795, 10.1109/eiconrus.2019.8656795]
[4]
[Десницкий Василий Алексеевич Desnitsky Vasily Alekseevich], 2016, [Труды СПИИРАН, Trudy SPIIRAN], P5, DOI 10.15622/sp.48.1
[5]
Domin K, 2016, Security analysis of the drone communication protocol: Fuzzing the mavlink protocol
[7]
Geethanjali N., 2012, SURVEY ENERGY DEPLET
[10]
Denial-of-service attacks on battery-powered mobile computers
[J].
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
2004,
:309-318