共 50 条
- [41] Countermeasures Against Jamming Attack in Sensor Networks with Timing and Power Constraints [J]. 2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 520 - 523
- [42] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
- [43] Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (04): : 805 - 821
- [45] Review on Security Issues and Attacks in Wireless Sensor Networks [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (04): : 81 - 88
- [46] A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks [J]. INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16, 2017, 527 : 668 - 677
- [47] Optimal jamming attacks and network Defense policies in wireless sensor networks [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1307 - +
- [48] Security to wireless sensor networks against malicious attacks using Hamming residue method [J]. EURASIP Journal on Wireless Communications and Networking, 2019