Author:
Song Yurong,Jiang Guo-Ping
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)
2. Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. Proc. of the 8th IEEE ICACT 2, 1043–1048 (2006)
3. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)
4. Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. Usenix Security (2002)
5. Zou, C.C., Towsley, D., Gong, W.B.: Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing 4, 105–118 (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献