@dblp

False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks.

, , , , , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 308-315. Springer, (2013)

Links and resources

Tags