Proactive Stealthiness for Wireless Sensor Networks
暂无分享,去创建一个
[1] Gabor Karsai,et al. Smart Dust: communicating with a cubic-millimeter computer , 2001 .
[2] Parameswaran Ramanathan,et al. Vulnerability of sensor networks to unauthorized traversal and monitoring , 2004, IEEE Transactions on Computers.
[3] Xiang-Yang Li,et al. Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.
[4] Wenzhe Zhang,et al. Local Optimum Algorithms for Self-Protection in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[5] Mark G. Terwilliger,et al. Overview of Sensor Networks , 2004 .
[6] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[7] Selim G. Akl,et al. Distributed Generation of a Family of Connected Dominating Sets in Wireless Sensor Networks , 2009, DCOSS.
[8] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[9] Qian Zhang,et al. The self-protection problem in wireless sensor networks , 2007, TOSN.
[10] Kristofer S. J. Pister,et al. Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.
[11] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.