相似文献/References:
[1]刘春涛 陆建德 王月平.一个新型分布式无线传感器分层路由协议[J].计算机技术与发展,2010,(04):35.
LIU Chun-tao,LU Jian-de,WANG Yue-ping.A New Distributed WSN Cluster- Based Routing Protocol[J].,2010,(02):35.
[2]杨帆[],刘冰[],沈来信[][]. 基于Tree-Lib的徽州民居特征采集库[J].计算机技术与发展,2014,24(08):246.
YANG Fan[],LIU Bing[],SHEN Lai-xin[][]. Feature Collecting Database of Huizhou Residences Based on Tree-Lib[J].,2014,24(02):246.
[3]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129.
LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(02):129.
[4]张昱[],曹伟[],邵世祥[]. 低功耗无线传感网节点的混合监听休眠方法[J].计算机技术与发展,2016,26(10):196.
ZHANG Yu[],CAO Wei[],SHAO Shi-xiang[]. A Hybrid Monitor Sleep Method of Low-power Wireless Sensor Network Nodes[J].,2016,26(02):196.
[5]董峰,张秋霞. 一种恶意节点攻击的无线传感器网络入侵检测方法[J].计算机技术与发展,2017,27(02):86.
DONG Feng,ZHANG Qiu-xia. An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack[J].,2017,27(02):86.