共 43 条
- [1] Agah A., 2007, INT J NETWORK SECURI, V5, P145
- [2] Akkaya K., 2005, Ad Hoc Networks, V3, P325, DOI 10.1016/j.adhoc.2003.09.010
- [5] [Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
- [6] [Anonymous], 2004, the third international symposium on Information processing in sensor networks
- [7] Node Capture Attacks in Wireless Sensor Networks: A System Theoretic Approach [J]. 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 6765 - 6772
- [8] Chi Lin, 2015, Algorithms and Architectures for Parallel Processing. 15th International Conference, ICA3PP 2015. Proceedings: LNCS 9530, P297, DOI 10.1007/978-3-319-27137-8_23
- [9] Chi Lin, 2015, Algorithms and Architectures for Parallel Processing. 15th International Conference, ICA3PP 2015. Proceedings: LNCS 9530, P403, DOI 10.1007/978-3-319-27137-8_30
- [10] De P, 2006, P 2006 INT S WORLD W, P237