[1] Coronato A, Pietro G. Situation awareness in applications of ambient assisted living for cognitive impaired people[J]. Mobile Networks and Applications, 2013, 18(3): 444-453.[2] Dong X, Srivastava D. Big data integration[C]//International Conference on Very Large Data Bases. Brisbane: IEEE Press, 2013: 1245-1248.[3] Dietzel S, Schoch E, Konings B, et al. Resilient secure aggregation for vehicular network[J]. IEEE Networks, 2010, 24(1): 26-31.[4] Wagner D. Resilient aggregation in sensor networks[C]//ACM Workshop on Security of Ad hoc and Sensor Networks. Washington: ACM Press, 2004: 78-87.[5] Bohili J, Papadimitratos P, Verardi D, et al. Resilient data aggregation for unattended WSNs[C]//IEEE International Workshop on Practical Issues in Building Sensor Network Applications. Bonn: IEEE Press, 2011: 994-1002.[6] Liu Xiaowu, Yu Jiguo, Wang Maoli. Network security situation generation and evaluation based on heterogeneous sensor fusion[C]//International Conference on Wireless Communnications, Networking and Mobile Computing. Beijing: IEEE Press, 2009: 1-4.[7] 闫琦, 杨家玮, 张雯. 认知无线电网络中安全的合作频谱感知[J]. 北京邮电大学学报, 2011, 34(2): 71-75. Yan Qi, Yang Jiawei, Zhang Wen. The sensing of the secure cooperative spectrum in cognitive radio networks[J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(2): 71-75.[8] Thomas C, Kewal K, Parameswaran R. Fault tolerance in collaborative sensor networks for target detection[J]. IEEE Transactions on Computers, 2004, 53(3): 320-333.[9] Cai Xiaodong, Giannakis G. A two-dimensional channel simulation model for shadowing processes[J]. IEEE Transactions on Vehicular Technology, 2003, 52(6): 1558-1567. |