Author:
Sun Da-Zhi,Li Jian-Xin,Feng Zhi-Yong,Cao Zhen-Fu,Xu Guang-Quan
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference28 articles.
1. Chen JH, Salim MB, Matsumoto M (2011) A single mobile target tracking in Voronoi-based clustered wireless sensor network. J Inf Process Syst 7(1):17–28
2. Kumar D, Aseri TC, Patel RB (2011) Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inf Technol Commun Converg 1(2):130–145
3. Zhao G, Kumar A (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inf Technol Commun Converg 1(3):297–317
4. Jeong YS, Lee SH (2006) Secure key management protocol in the wireless sensor network. J Inf Process Syst 2(1):48–51
5. Ponomarchuk Y, Seo DW (2010) Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J Converg 1(1):35–42
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献