共 11 条
[1]
Agarwal A. K., 2005, 2005 2nd International Conference on Broadband Networks (Broadnets) (IEEE Cat. No. 05EX1116), P581
[2]
Ahmadi M., 2012, IEEE ICET, P1
[3]
Akram R.N., 2016, 2016 IEEEAIAA 35 DIG, P1
[4]
Bilski Tomasz, 2016, Przeglad Elektrotechniczny, V92, P228, DOI 10.15199/48.2016.12.59
[5]
Boukerche A., 2009, ALGORITHMS PROTOCOLS
[6]
Derecka A., 2018, P SPIE, V10808
[7]
INFORMATION SECURITY TRADES IN TACTICAL WIRELESS NETWORKS
[J].
MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2015,
2015, 9497
[8]
Kurose James F., 2013, Computer networking: a topdown approach
[9]
Oksiiuk O., 2019, INFORM AUTOMATYKA PO, V9, P53, DOI 10.5604/01.3001.0013.0921
[10]
Investigating End-to-End Security in the Fifth Generation Wireless Capabilities and IoT Extensions
[J].
CYBER SENSING 2016,
2016, 9826