1 |
Akyildiz I F , Su W , Sankarasubramaniam Y , et al. Wireless sensor networks:a survey. Computer Networks, 2002,38(4): 393~422
|
2 |
Perrig A , Stankovic J , Wagner D . Security in wireless sensor networks. Communications of the ACM, 2004,47(6): 53~57
|
3 |
宋玉蓉, 蒋国平 . 无线传感器网络中恶意软件传播研究. 南京邮电大学学报(自然科学版), 2009: 29,(4): 1~7
|
4 |
Mickens J W , Noble B D . Modeling epidemic spreading in mobile environments.In: Proceedings of the 4th ACM Workshop on Wireless Security, Cologne,Germany: ACM Press, 2005: 77~86
|
5 |
Millsk L . A brief survey of self-organization in wireless sensor networks. Wireless Communications and Mobile Computing, 2007,7(4): 823~834
|
6 |
Khayams A , Radha H . Using signal processing techniques to model worm propagation over wireless sensor networks. IEEE Signal Processing Magazine, 2006,23(2): 164~169
|
7 |
Nekovee M . Worm epidemics in wireless ad hoc networks. New Journal of Physics, 2007,9(6)
|
1 |
Karyotis V , Kakal IS A , Papavassil Iou S . Malware-Propagative mobile ad hoc networks:asymptotic behavior analysis. J Comput Sci & Technol, 2008,23(3): 389~399
|
9 |
Pradip De , Yonghe Liu , Sajal K Das . Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Transactions on Sensor Networks, 2009,5(3): 1~29
|
10 |
Badakhshan M , Arifler D . Simulation based analysis of spreading dynamics of malware in wireless sensor networks.In: Proceedings of the 2007 IEEE International Conference on Sensor Technologies and Applications(SENSORCOMM 2007), Valencia,Spain, 2007
|
11 |
Hsieh M Y , Huang Y M , Chao H C . Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications, 2007,30(11): 2385~2400
|
12 |
田炜, 杨震 . 新的位置感知分簇算法. 通信学报, 2010, 31,(3): 25~30
|
13 |
Heinzelman D , Chandrakasan A P , Balakrishnan H . Application specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 2002,1(4): 660~670
|
14 |
Younis O , Fahmy S . HEED:a hybrid,energy-efficient,distributed clustering approach for ad-hoc networks. IEEE Transactions on Mobile Computing, 2004,3(4): 660~669
|
15 |
Manjeshwar A , Agrawal D P , STARNER T . TEEN:a routing protocol for enhanced efficiency in wireless sensor networks.In: Proceedings of the 15th Parallel and Distributed Processing Symposium, San Francisco,California,USA, 2001
|
16 |
张重庆, 李明禄, 伍民友 . 数据收集传感器网络的负载平衡网络构建方法. 软件学报, 2007: 18,(10): 1111~1112
|
17 |
Xu Y , Heidemann J , Estrin D . Geography-informed energy conservation for ad hoc routing.In: Proceedings of the 7th Annual Int'l Conference on Mobile Computing and Networking, Rome,Italy, 2001
|
18 |
Blough D M , Santi P . Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc network.In: Proceedings of 8th Annual Int'l Conf on Mobile Computing and Networking, Atlanta,GA,USA, 2002
|
19 |
Georgoudas I G , Sirakoulis G Ch , Andreadis I . Modeling earthquake activity features using cellular automata. Mathematical and Computer Modelling, 2007,46(1/2): 124~137
|
20 |
Cunha D , Silva A P , Loureiro A A F , et al. Simulating largewireless sensor networks using cellular automata.In: Proceedings of the 38th annual Symposium on Simulation, San Diego,CA,USA, 2005
|