Y. Zhou, Y. Fang, and Y. Zhang, Securing wireless sensor networks: a survey, IEEE Communications Surveys & Tutorials, vol.10, issue.3, p.3, 2008.
DOI : 10.1109/COMST.2008.4625802

J. Staddon, D. Balfanz, and G. Durfee, Efficient tracing of failed nodes in sensor networks, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications , WSNA '02, pp.122-130, 2002.
DOI : 10.1145/570738.570756

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000.
DOI : 10.1145/345910.345955

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1032.9249

Y. Zhang and W. Lee, Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.275-283, 2000.
DOI : 10.1145/345910.345958

K. Sentz, Combination of Evidence in Dempester-Shafer Theory, 2002.

D. Koks and S. Challa, An Introduction to Bayesian and Dempster-Shafer Data Fusion, 2005.

C. Holder, R. Boyles, P. Robinson, S. Raman, and G. Fishel, Calculating A Daily Normal Temperature Range That Reflects Daily Temperature Variability, Bulletin of the American Meteorological Society, vol.87, issue.6, 2006.
DOI : 10.1175/BAMS-87-6-769