共 44 条
[2]
Alcyildiz I. F., 2002, COMPUTER NETWORKS, V38, P393, DOI DOI 10.1016/S1389-1286(01)00302-4
[3]
Alsemairi S., 2016, P IEEE WIR COMM NETW, P1
[4]
Clustering-based Mitigation of Anonymity Attacks in Wireless Sensor Networks
[J].
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM),
2015,
[5]
Alsemairi S, 2015, INT WIREL COMMUN, P337, DOI 10.1109/IWCMC.2015.7289106
[6]
[Anonymous], 2001, MOBICOM 2001 P 7 ANN
[7]
Bangash Y, 2015, PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), P158, DOI 10.1109/NAS.2015.7255210
[8]
Baroutis N., 2017, SECUR COMMUN NETW
[9]
Baroutis N, 2016, GLOB COMM C GLOBECOM, V4, P1
[10]
Baroutis N, 2015, C LOCAL COMPUT NETW, P109, DOI 10.1109/LCN.2015.7366289