1. Aupetit M. Function approximation with continuous self-organizing maps using neighboring influence interpolation. In: Proceedings of neural computation. ICSC Berlin, Germany: Academic Press, May 2000. URL http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.320.
2. Trust-based security for wireless ad hoc and sensor networks;Boukerch;Comput. Commun.,2007
3. Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proceedings of Symposium on Security and privacy, 2003. p. 197–213.
4. Comaniciu D. Nonparametric information fusion for motion estimation. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition. vol. 1. Madison, WI, USA: IEEE Computer Society;June 16–22 , 2003. p. I-59-I-66.
5. ECCE: enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks;Conti;Ad Hoc Netw.,2007