共 50 条
- [1] Localized Identification of Malicious Nodes in Wireless Sensor Networks [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
- [3] DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 2238 - 2244
- [6] Malicious Node Identification Method Based on Intelligent Algorithm for Edge Computing [J]. 2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 363 - 367
- [7] Nodes scheduling algorithm based on dynamic cluster in wireless sensor network [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2022, 52 (06): : 1466 - 1476
- [8] D-S based Fusion Method for Against Malicious Nodes in Wireless Sensor Networks [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 520 - 525
- [9] A Global Reputation Estimation and Analysis Technique for Detection of Malicious Nodes in a Post-Disaster Communication Environment [J]. 2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 179 - 185
- [10] Selection of Optimistic Nodes for Reputation Based Routing in Wireless Networks [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS (ICSSS 2020), 2020, : 494 - 498