共 75 条
[1]
Adams WJ, 2007, INT FED INFO PROC, V238, P91
[2]
Aivaloglou E, 2006, LECT NOTES COMPUT SC, V4347, P179
[3]
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2013, 10 (02)
:189-203
[4]
[Anonymous], P 3 INT C NETW SERV
[6]
Bao F., 2012, IEEE Transactions on Network and Service Management, V9, P161
[7]
Bastani F. B., 1994, Annual Reliability and Maintainability Symposium. 1994 Proceedings (Cat. No.94CH3391-0), P442, DOI 10.1109/RAMS.1994.291149
[8]
Bengtsson LE., 2012, J SENSOR TECHNOL, V2, P177, DOI DOI 10.4236/JST.2012.24025
[9]
Decentralized trust management
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:164-173
[10]
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828