4.6 Article

M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Hardware & Architecture

A comparative analysis of node replica detection schemes in wireless sensor networks

Alekha Kumar Mishra et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Theory & Methods

Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks

Hongjuan Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Theory & Methods

CHEMAS: Identify suspect nodes in selective forwarding attacks

Bin Xiao et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2007)

Article Engineering, Multidisciplinary

An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems

N Ye et al.

QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL (2001)