[1]
|
王殊, 阎毓杰, 胡富平, 等. 无线传感器网络的理论及应用[M]. 北京: 北京航空航天大学出版社, 2007.
|
[2]
|
Fekete, S.P., Kroller, A., Pfisterer, D., et al. (2004) Locating and Bypassing Routing Holes in Sensor Networks. Proceedings of International Workshop on Algorithmic Aspects of Wireless Sensor Networks.
|
[3]
|
郎为民, 杨德鹏, 李虎生. 智能电网WCSN安全体系架构研究[J]. 信息网络安全, 2012(4): 19-22.
|
[4]
|
Wang, Y., Lin, W. and Zhang, T. (2010) Study on Security of Wireless Sensor Networks in Smart Grid. Proceedings of 2010 International Conference on Power System Technology, Hangzhou, 24-28 October 2010, 267-273.
https://doi.org/10.1109/POWERCON.2010.5666729
|
[5]
|
Zouridaki, C., Mark, B.L., Hejmo, M. and Thomas, R.K. (2005) A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 7 November 2005, 1-10. https://doi.org/10.1145/1102219.1102222
|
[6]
|
Choi, H., Zhu, S. and La Porta, T.F. (2007) SET: Detecting Node Clones in Sensor Networks. 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Nice, 17-21 September 2007, 341-350. https://doi.org/10.1109/SECCOM.2007.4550353
|
[7]
|
Parno, B., Perrig, A. and Gligor, V. (2005) Distributed Detection of Node Replication Attacks in Sensor Networks. 2005 IEEE Symposium on Security and Privacy, 8-11 May 2005, 49-63. https://doi.org/10.1109/SP.2005.8
|
[8]
|
Yu, C.M., Lu, C.S. and Kuo, S.Y. (2016) Compressed Sensing-Based Clone Identification in Sensor Networks. IEEE Transactions on Wireless Communications, 15, 3071-3084. https://doi.org/10.1109/TWC.2016.2516021
|
[9]
|
Khan, W.Z., Aalsalem, M.Y., Saad, N.M., Xaing, Y. and Luan, T.H. (2014) Detecting Replicated Nodes in Wireless Sensor Networks Using Random Walks and Network Division. 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, 6-9 April 2014, 2623-2628. https://doi.org/10.1109/WCNC.2014.6952822
|
[10]
|
Ho, Y.S., Ma, R.L., Sung, C.E., Tsai, I.C., Kang, L.W. and Yu, C.M. (2015) Deterministic Detection of Node Replication Attacks in Sensor Networks. 2015 IEEE International Conference on Consumer Electronics, Taipei, 6-8 June 2015, 468-469. https://doi.org/10.1109/ICCE-TW.2015.7217002
|
[11]
|
Cheng, G., Guo, S., Yang, Y. and Wang, F. (2015) Replication Attack Detection with Monitor Nodes in Clustered Wireless Sensor Networks. 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, 14-16 December 2015, 1-8. https://doi.org/10.1109/pccc.2015.7410341
|
[12]
|
楼晓俊, 李隽颖, 刘海涛. 距离修正的模糊C均值聚类算法[J]. 计算机应用, 2012, 32(3): 646-648.
|
[13]
|
齐淼, 张化祥. 改进的模糊C均值聚类算法研究[J]. 计算机工程与应用, 2009, 45(20): 133-135.
|
[14]
|
罗会兰, 危辉. 一种基于聚类集成技术的混合型数据聚类算法[J]. 计算机科学, 2010, 37(11): 234-238.
|
[15]
|
Jing, L., Ng, M.K. and Huang, J.Z. (2007) An Entropy Weighting k-Means Algorithm for Subspace Clustering of High-Dimensional Sparse Data. IEEE Transactions on Knowledge and Data Engineering, 19, 1026-1041.
https://doi.org/10.1109/TKDE.2007.1048
|
[16]
|
Balli, H., Yan, X. and Zhang, Z. (2009) On Randomized Linear Network Codes and Their Error Correction Capabilities. IEEE Transactions on Information Theory, 55, 3148-3160. https://doi.org/10.1109/TIT.2009.2018173
|
[17]
|
Ngai, C.K., Yeung, R.W. and Zhang, Z. (2011) Network Generalized Hamming Weight. IEEE Transactions on Information Theory, 57, 1136-1143. https://doi.org/10.1109/TIT.2010.2095233
|