[1] |
International Telecommunication Union. Internet reports 2005: The Internet of Things[R]. 7ed, Geneva: ITU, 2005.
|
[2] |
范存群,王尚广,孙其博,等.基于能量监测的传感器信任评估方法研究[J]. 电子学报, 2013, 41(4): 646-651.FAN Cunqun, WANG Shangguang, SUN Qibo, et al. A trust evaluation method of sensors based on energy monitoring[J]. Acta Electronica Sinica, 2013, 41(4): 646-651.
|
[3] |
HE D J, CHEN C, CHAN S, et al. A distributed trust evaluation model and its application scenarios for medical Sensor networks[J]. IEEE Transaction on Information Technology in Biomedicine, 2012, 16(6): 1164-1175.
|
[4] |
SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of Things: The road ahead[J]. Computer Networks, 2015, 76: 146-164.
|
[5] |
ZHANG B, HUANG Z H, XIANG Y. A novel multiple-level trust management framework for wireless sensor networks[J]. Computer Networks, 2014, 72: 45-61.
|
[6] |
CHENG S Y, LI J Z, CAI Z P. O(ε)-approximation to physical world by sensor networks[C]// Proceedings of IEEE INFOCOM’13.Piscataway, USA: IEEE Press, 2013: 3084-3092.
|
[7] |
DONG X L, BERTI-EQUILLE L, SRIVASTAVA D. Truth discovery and copying detection in a dynamic world[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 562-573.
|
[8] |
余伟, 李石君, 杨莎, 等. Web大数据环境下的不一致跨源数据发现[J]. 计算机研究与发展, 2015, 52(2): 295-308.YU Wei, LI Shijun, YANG Sha, et al. Automatically discovering of inconsistency among cross-source Data based on Web big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 295-308.
|
[9] |
张安珍,门雪莹,王宏志,等.大数据上基于Hadoop的不一致数据检测与修复算法[J]. 计算机科学与探索, 2015, 9(9): 1044-1055.
|
[10] |
金连,王宏志,黄沈滨,等.基于Map-Reduce的大数据缺失值填充算法[J]. 计算机研究与发展, 2013, 50: 312-321.
|
[11] |
罗元剑,姜建国,王思叶,等.基于有限状态机的RFID流数据过滤与清理技术[J].软件学报, 2014, 25(8): 1713-1728.LUO Yuanjian, JIANG Jianguo, WANG Siye, et al. Filtering and cleaning for RFID streaming Data technology based on finite state machine[J]. Journal of Software, 2014, 25(8): 1713-1728.
|
[12] |
陈振国,田立勤. 信任模型在雾霾感知源评价中的应用[J].计算机应用, 2016, 36(2): 472-477.CHEN Zhenguo, TIAN Liqin. Application of trust model in evaluation of haze perception source[J]. Journal of Computer Applications, 2016, 36(2): 472-477.
|
[13] |
罗涛,李俊涛,刘瑞娜,等.VANET中安全信息的快速可靠广播路由算法[J].计算机学报, 2015, 38(3): 663-672.LUO Tao, LI Juntao, LIU Ruina, et al. A fast and reliable broadcast routing algorithm for safety related information in VANET[J]. Chinese Journal of Computers, 2015, 38(3): 663-672.
|
[14] |
田立勤,林闯, 张琪,等.物联网监测拓扑可靠性设计与优化分析[J].软件学报, 2014, 25(8): 1625-1639.TIAN Liqin, LIN Chuang, ZHANG Qi, et al. Topology reliability design and optimization analysis of IoT-based monitoring[J]. Journal of Software, 2014, 25(8): 1625-1639.
|
[15] |
钟晓睿,马春光.基于动态累加器的异构传感网认证组密钥管理方案[J]. 通信学报, 2014, 35(3): 124-134.ZHONG Xiaorui, MA Chunguang. Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network[J]. Journal on Communications, 2014, 35(3): 124-134.
|
[1] |
International Telecommunication Union. Internet reports 2005: The Internet of Things[R]. 7ed, Geneva: ITU, 2005.
|
[2] |
范存群,王尚广,孙其博,等.基于能量监测的传感器信任评估方法研究[J]. 电子学报, 2013, 41(4): 646-651.FAN Cunqun, WANG Shangguang, SUN Qibo, et al. A trust evaluation method of sensors based on energy monitoring[J]. Acta Electronica Sinica, 2013, 41(4): 646-651.
|
[3] |
HE D J, CHEN C, CHAN S, et al. A distributed trust evaluation model and its application scenarios for medical Sensor networks[J]. IEEE Transaction on Information Technology in Biomedicine, 2012, 16(6): 1164-1175.
|
[4] |
SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of Things: The road ahead[J]. Computer Networks, 2015, 76: 146-164.
|
[5] |
ZHANG B, HUANG Z H, XIANG Y. A novel multiple-level trust management framework for wireless sensor networks[J]. Computer Networks, 2014, 72: 45-61.
|
[6] |
CHENG S Y, LI J Z, CAI Z P. O(ε)-approximation to physical world by sensor networks[C]// Proceedings of IEEE INFOCOM’13.Piscataway, USA: IEEE Press, 2013: 3084-3092.
|
[7] |
DONG X L, BERTI-EQUILLE L, SRIVASTAVA D. Truth discovery and copying detection in a dynamic world[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 562-573.
|
[8] |
余伟, 李石君, 杨莎, 等. Web大数据环境下的不一致跨源数据发现[J]. 计算机研究与发展, 2015, 52(2): 295-308.YU Wei, LI Shijun, YANG Sha, et al. Automatically discovering of inconsistency among cross-source Data based on Web big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 295-308.
|
[9] |
张安珍,门雪莹,王宏志,等.大数据上基于Hadoop的不一致数据检测与修复算法[J]. 计算机科学与探索, 2015, 9(9): 1044-1055.
|
[10] |
金连,王宏志,黄沈滨,等.基于Map-Reduce的大数据缺失值填充算法[J]. 计算机研究与发展, 2013, 50: 312-321.
|
[11] |
罗元剑,姜建国,王思叶,等.基于有限状态机的RFID流数据过滤与清理技术[J].软件学报, 2014, 25(8): 1713-1728.LUO Yuanjian, JIANG Jianguo, WANG Siye, et al. Filtering and cleaning for RFID streaming Data technology based on finite state machine[J]. Journal of Software, 2014, 25(8): 1713-1728.
|
[12] |
陈振国,田立勤. 信任模型在雾霾感知源评价中的应用[J].计算机应用, 2016, 36(2): 472-477.CHEN Zhenguo, TIAN Liqin. Application of trust model in evaluation of haze perception source[J]. Journal of Computer Applications, 2016, 36(2): 472-477.
|
[13] |
罗涛,李俊涛,刘瑞娜,等.VANET中安全信息的快速可靠广播路由算法[J].计算机学报, 2015, 38(3): 663-672.LUO Tao, LI Juntao, LIU Ruina, et al. A fast and reliable broadcast routing algorithm for safety related information in VANET[J]. Chinese Journal of Computers, 2015, 38(3): 663-672.
|
[14] |
田立勤,林闯, 张琪,等.物联网监测拓扑可靠性设计与优化分析[J].软件学报, 2014, 25(8): 1625-1639.TIAN Liqin, LIN Chuang, ZHANG Qi, et al. Topology reliability design and optimization analysis of IoT-based monitoring[J]. Journal of Software, 2014, 25(8): 1625-1639.
|
[15] |
钟晓睿,马春光.基于动态累加器的异构传感网认证组密钥管理方案[J]. 通信学报, 2014, 35(3): 124-134.ZHONG Xiaorui, MA Chunguang. Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network[J]. Journal on Communications, 2014, 35(3): 124-134.
|