共 50 条
- [41] A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 1, PROCEEDINGS, 2010, 6081 : 559 - 570
- [42] Detecting and Defending against Replication Attacks in Wireless Sensor Networks [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
- [43] Dishonest Recommendation Attacks in Wireless Sensor Networks: A Survey [J]. 2015 12TH IEEE INTERNATIONAL CONFERENCE ON PROGRAMMING AND SYSTEMS (ISPS), 2015, : 41 - 50
- [45] Imposter detection for replication attacks in mobile sensor networks [J]. COMPUTER NETWORKS, 2016, 108 : 210 - 222
- [46] Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey [J]. IEEE ACCESS, 2021, 9 : 128765 - 128785
- [47] Imposter Detection for Replication Attacks in Mobile Sensor Networks [J]. 2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
- [48] On the Resilience to Node Capture Attacks of Secure Wireless Sensor Networks [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 887 - 893
- [49] Detection of Node Failure in Wireless Sensor Networks [J]. 2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 133 - 138
- [50] DETECTION OF MILICIOUS NODE IN WIRELESS SENSOR NETWORKS [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,