共 40 条
- [21] Lenders V., 2015, DETECTION INTRUSIONS, P67, DOI [10.1007/978-3-319-20550-24, 10.1007/978-3-319-20550-2_4]
- [23] Monteiro M., 2015, P IEEE AIAA 34 DIG A
- [24] Perrig A., 2002, RSA CryptoBytes, V5, P2
- [25] Porambage P, 2014, IEEE WCNC, P2728, DOI 10.1109/WCNC.2014.6952860
- [26] Proano A., 2010, COMMUNICATIONS ICC 2, P1
- [27] Purton L., 2010, P AUSTR TRANSP RES F
- [28] RTCA Inc, 2011, DO260B RTCA, V1, P1365
- [29] Sampigethaya K., 2011, Communication Systems and Networks (COMSNETS), P1
- [30] Schäfer M, 2014, PROCEEDINGS OF THE 13TH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN' 14), P83, DOI 10.1109/IPSN.2014.6846743