共 21 条
[1]
Almas-Shehni Rezvan, 2017, FUTURE INTERNET, V10, P1, DOI [10.3390/fi10010001, DOI 10.3390/FI10010001]
[2]
Balachandran Nitish, 2012, INT J ADV NETWORKING, V4
[3]
Dhamodharan Udaya Suriya Raj Kumar, 2015, ScientificWorldJournal, V2015, P841267, DOI 10.1155/2015/841267
[4]
Efimenko M. S., 2018, YOUNG SCI, V4042
[5]
Grover J, 2016, INT CONF RELI INFO, P397, DOI 10.1109/ICRITO.2016.7784988
[8]
A Sybil attack detection scheme for a forest wildfire monitoring application
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 80
:613-626
[9]
Secure routing in wireless sensor networks: Attacks and countermeasures
[J].
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS,
2003,
:113-127
[10]
Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature
[J].
SYMMETRY-BASEL,
2017, 9 (03)