1 |
Q. Cui, P. Liu, J. Wang and J. Yu, "Brief Analysis of Drone Swarms Communication," 2017 IEEE International Conference on Unmanned Systems(ICUS), Beijing, pp. 463-466, 2017.
|
2 |
X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi and J. Chen, "Anti-Drone System with Multiple Surveillance Technologies: Architecture, Implementation, and Challenges," in IEEE Communications Magazine, Vol. 56, No. 4, pp. 68-74, APRIL 2018.
|
3 |
N. Renugadevi, G. Swaminathan and A. S. Kumar, "Key Management Schemes for Secure Group Communication in Wireless Networks - A Survey," 2014 International Conference on Contemporary Computing and Informatics(IC3I), Mysore, pp. 446- 450, 2014.
|
4 |
B. Jiang and X. Hu, "A Survey of Group Key Management," 2008 International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 994-1002, 2008.
|
5 |
Zheng, X. L., Huang, C. T., Matthews, M., "Chinese Remainder Theorem based Group Key Management," Association for Computing Machinery Proc. 45th Annual Southeast Regional Conf.(ACMSE-07), Winston-Salem, North Carolina, USA, pp. 266-271, 2007.
|
6 |
Y. Zhang, N. Meratnia and P. Havinga, “Outlier Detection Techniques for Wireless Sensor Networks: A Survey,” in IEEE Communications Surveys & Tutorials, Vol. 12, No. 2, pp. 159-170, Second Quarter 2010.
DOI
|
7 |
Zhou, J., Ou, Y.-H., “Key Tree and Chinese Remainder Theorem based Group Key Distribution Scheme,” J. Chin. Inst. Eng., Vol. 32, No. 7, pp. 967-974, 2009.
DOI
|
8 |
C. Li, Y. Li, Z. Tian, S. L. Weekes and K. Pahlavan, "Design and Performance Evaluation of a Localization System to Locate Unwanted Drones by using Wireless Signals," 2018 IEEE International Conference on Consumer Electronics(ICCE), Las Vegas, NV, pp. 1-6, 2018.
|