文
论文分享
演练场
杂货铺
论文推荐
字
编辑器下载
登录
注册
Lv Guoyuan
发表
A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
Zhu Can-yan, Wang Yi-ming, Chen Rong, 2013, CloudCom 2013.