Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.607-640, 2012. ,
DOI : 10.1109/SURV.2011.041911.00093
From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks, IEEE Communications Surveys & Tutorials, vol.14, issue.4, pp.1166-1182, 2012. ,
DOI : 10.1109/SURV.2011.081611.00102
Bubble rap, Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '08, pp.1576-1589, 2011. ,
DOI : 10.1145/1374618.1374652
GeoSpray: A geographic routing protocol for vehicular delay-tolerant networks, Information Fusion, vol.15, pp.102-113, 2014. ,
DOI : 10.1016/j.inffus.2011.11.003
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.22-32, 2014. ,
DOI : 10.1109/TPDS.2013.36
Sociality-Aided New Adaptive Infection Recovery Schemes for Multicast DTNs, IEEE Transactions on Vehicular Technology, vol.65, issue.5, pp.1-1, 2015. ,
DOI : 10.1109/TVT.2015.2450202
Tracking Message Spread in Mobile Delay Tolerant Networks, IEEE Transactions on Mobile Computing, vol.14, issue.8, pp.1737-1750, 2015. ,
DOI : 10.1109/TMC.2014.2362746
URL : https://hal.archives-ouvertes.fr/hal-01205134
Defective Sensor Identification for WSNs Involving Generic Local Outlier Detection Tests, IEEE Transactions on Signal and Information Processing over Networks, vol.2, issue.1, pp.29-48, 2016. ,
DOI : 10.1109/TSIPN.2016.2516821
URL : https://hal.archives-ouvertes.fr/hal-01260533
Outlier Detection Techniques for Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.12, issue.2, pp.159-170, 2010. ,
DOI : 10.1109/SURV.2010.021510.00088
Fault Diagnosis in Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2000-2026, 2013. ,
DOI : 10.1109/SURV.2013.030713.00062
A Survey on Distributed Filtering and Fault Detection for Sensor Networks, Mathematical Problems in Engineering, vol.2014, 2014. ,
DOI : 10.1080/21642583.2013.804463
Distributed fault detection of wireless sensor networks, Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks , DIWANS '06, pp.65-72, 2006. ,
DOI : 10.1145/1160972.1160985
Weighted-Median Based Distributed Fault Detection for Wireless Sensor Networks, Journal of Software, vol.18, issue.5, pp.1208-1217, 2007. ,
DOI : 10.1360/jos181208
Distributed Fault Detection for Wireless Sensor Based on Weighted Average, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp.57-60, 2010. ,
DOI : 10.1109/NSWCTC.2010.21
Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test, Ad Hoc Networks, pp.170-184, 2015. ,
DOI : 10.1016/j.adhoc.2014.10.006
Distributed faulty node detection and isolation in delay-tolerant vehicular sensor networks, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications, (PIMRC), pp.1497-1502, 2012. ,
DOI : 10.1109/PIMRC.2012.6362584
Behavioral Malware Detection in Delay Tolerant Networks, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.1, pp.53-63, 2014. ,
DOI : 10.1109/TPDS.2013.27
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transactions on Mobile Computing, vol.14, issue.6, pp.1162-1175, 2015. ,
DOI : 10.1109/TMC.2014.2343627
An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks, IEEE Transactions on Mobile Computing, vol.11, issue.9, pp.1514-1531, 2012. ,
DOI : 10.1109/TMC.2011.160
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities, IEEE Transactions on Mobile Computing, vol.14, issue.11, pp.2376-2391, 2015. ,
DOI : 10.1109/TMC.2015.2398425
The sybil attack, " in Peer-to-peer Systems, pp.251-260, 2002. ,
An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network, IEEE Transactions on Mobile Computing, vol.14, issue.12, pp.2447-2459, 2015. ,
DOI : 10.1109/TMC.2015.2402120
Recognizing Exponential Inter-Contact Time in VANETs, 2010 Proceedings IEEE INFOCOM, pp.1-5, 2010. ,
DOI : 10.1109/INFCOM.2010.5462263
Special Issue on Bounded-Error Estimation: Issue 1, Int. Jnl of Adapt. Cont. and Sig. Proc, vol.8, issue.1, pp.1-118, 1994. ,
Bounding Approaches to System Identification, 1996. ,
DOI : 10.1007/978-1-4757-9545-5
Applied Interval Analysis, 2001. ,
DOI : 10.1007/978-1-4471-0249-6
URL : https://hal.archives-ouvertes.fr/hal-00845131
Fixed point theory, 2013. ,
DOI : 10.1007/978-0-387-21593-8
Sur les opérations dans les ensembles abstraits et leur application auxéquationsaux´auxéquations intégrales, Fund. Math, vol.3, issue.1, pp.133-181, 1922. ,
Reality mining: sensing complex social systems, Personal and ubiquitous computing, pp.255-268, 2006. ,
DOI : 10.1007/s00779-005-0046-3
Encounter traces for the one simulator ,
Elements of information theory, 2012. ,