Sciweavers

2656 search results - page 532 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 5 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao