共 36 条
[1]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]
[Anonymous], SURVEY SECURITY WIRE
[3]
[Anonymous], 2008, INT J NETW SECUR
[4]
[Anonymous], P 2010 2 INT C COMP
[5]
[Anonymous], WEAKNESS SECURED AUT
[6]
[Anonymous], GLOB J COMPUT SCI TE
[7]
[Anonymous], INT J NETWORK SECURI
[8]
Wireless sensor network denial of sleep attack
[J].
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2005,
:356-364
[9]
Buttyan Levente, 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), P419, DOI 10.1109/PERCOMW.2010.5470633