Using network traffic to infer compromised neighbors in wireless sensor nodes | IEEE Conference Publication | IEEE Xplore