相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A comparative analysis of node replica detection schemes in wireless sensor networks
Alekha Kumar Mishra et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
Hongjuan Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
CHEMAS: Identify suspect nodes in selective forwarding attacks
Bin Xiao et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2007)
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
N Ye et al.
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL (2001)