共 50 条
- [31] Malicious beacon detection for localization in wireless sensor networks [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1410 - +
- [32] Trust based Secure Routing Protocol using Fuzzy Logic in Wireless Sensor Networks [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1264 - 1268
- [33] Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2016), 2016, 9581 : 188 - 192
- [34] A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 860 - 865
- [35] Malicious Node Detection Using Minimal Event Cycle Computation Method in Wireless Sensor Networks [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
- [36] Adaptive Trust Management Protocol Based on Fault Detection for Wireless Sensor Networks [J]. SERVICE COMPUTATION 2010: THE SECOND INTERNATIONAL CONFERENCES ON ADVANCED SERVICE COMPUTING, 2010, : 215 - 221
- [37] Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks [J]. 2013 ROEDUNET INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH, 12TH EDITION, 2013,
- [40] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks [J]. 2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82