共 33 条
[1]
Bernaschi M(2008)Access points vulnerabilities to DoS attacks in 802.11 networks Wirel Netw 14 159-169
[2]
Ferreri F(2005)Long-term prediction of discharges in manwan hydropower using adaptive-network-based fuzzy inference systems models Adv Nat Comput Lect Notes Comput Sci 3612 1152-1161
[3]
Valcamonici L(1992)Performance analysis of bearing-only target location algorithms IEEE Trans Aerosp Electron Syst 28 817-828
[4]
Cheng CT(2009)The WEKA Data Mining Software: an update SIGKDD Explor 11 10-18
[5]
Lin JY(2007)Wireless sensor network localization techniques Comput Netw 51 2529-2553
[6]
Sun YG(1996)A methodology for testing intrusion detection systems IEEE Trans Softw Eng 22 719-729
[7]
Chau K(2004)A key recovery attack on the 802.11b Wired Equivalent Privacy Protocol (WEP) ACM Trans Inf Syst Secur 7 319-332
[8]
Gavish M(2007)Breaking 104 Bit WEP in less than 60 seconds Inf Secur Appl Lect Notes Comput Sci 4867 188-202
[9]
Weiss A(2012)Calibration of Xinanjiang model parameters using hybrid genetic algorithm based fuzzy optimal model J Hydroinform 14 784-799
[10]
Hall M(undefined)undefined undefined undefined undefined-undefined