Author:
Cordero Claudio Valencia,Lisser Abdel
Funder
Comisión Nacional de Investigación Científica y Tecnológica
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference18 articles.
1. Sakthidharan, G. R., & Chitra, S. (2012). A survey on wireless sensor network: An applications perspective. IEEE international conference on computer communication and informatics (ICCCI).
2. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.
3. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials, 11(4), 42–56.
4. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. Urbana-Champaign: ACM MobiHoc.
5. Barron, (2008). Game theory: An introduction. New Jersey: Wiley Series in Operations Research and Management Science.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献