共 15 条
[1]
[Anonymous], 1990, TECHNICAL REPORT
[2]
[Anonymous], 1992, TECHNICAL REPORT
[3]
[Anonymous], 1997, IEEE T AUTOM CONTROL, DOI DOI 10.1109/TAC.1997.633847
[5]
Kumar S., 1995, Proceedings of the 18th National Information Security Conference, P194
[6]
Li Y., 2004, P INF SYST ED C
[7]
Perkins CharlesE., 2003, RFC3561
[8]
Ross T. J., FUZZY LOGIC ENG APPL
[9]
Sen S., 2008, INTRUSION DETECTION
[10]
Sen S., 2008, GUIDE WIRELESS AD HO