共 50 条
[31]
A Two-step Constrained Least Squares Localization in Wireless Sensor Networks
[J].
2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS (ICCCAS 2018),
2018,
:296-300
[32]
Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
[J].
Wireless Personal Communications,
2021, 117
:1209-1222
[34]
An Algorithm to Detect Malicious Nodes in Wireless Sensor Network using Enhanced LEACH protocol
[J].
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA),
2015,
:875-881
[35]
A Novel Stochastic Localization Algorithm for Sensor Nodes in Wireless Sensor Networks
[J].
QUANTUM, NANO, MICRO AND INFORMATION TECHNOLOGIES,
2011, 39
:510-+
[36]
Reliability of Sensor Nodes in Wireless Sensor Networks of Cyber Physical Systems
[J].
ICTE 2016,
2017, 104
:380-384
[37]
An Experimental Analysis on the Behavior and Influence of the Selfish Sensor Nodes on Node Scheduling in Wireless Sensor Networks
[J].
ADVANCES IN WIRELESS SENSOR NETWORKS,
2015, 501
:311-317
[38]
Security Verification of Location Estimate in Wireless Sensor Networks
[J].
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM),
2010,
[39]
Static Verification of Wireless Sensor Networks with Formal Methods
[J].
8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012),
2012,
:587-594
[40]
Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks
[J].
INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017),
2017, 10618
:118-126