共 50 条
[41]
Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks
[J].
INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017),
2017, 10618
:118-126
[42]
Utilizing behaviour history to right malicious nodes in wireless Ad-hoc networks
[J].
INFORMATION MANAGEMENT IN THE NETWORKED ECONOMY: ISSUES & SOLUTIONS,
2007,
:81-87
[43]
Detection and Localization of Outlier Nodes in Wireless Sensor Networks via Jointing Temporal and Spatial Residuals
[J].
Tien Tzu Hsueh Pao/Acta Electronica Sinica,
2023, 51 (05)
:1172-1178
[44]
Two-step TOA estimation method for UWB based wireless sensor networks
[J].
Ruan Jian Xue Bao/Journal of Software,
2007, 18 (05)
:1164-1172
[46]
Distributed detection in wireless sensor networks
[J].
7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS,
2008,
:401-+
[47]
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
[J].
ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING,
2011, 203
:410-419
[49]
SAWR: Scheduling Algorithm for Wireless Sensor Networks with Rendezvous Nodes
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC),
2015,
:600-603