Sciweavers

51 search results - page 5 / 11
» Intrusion K-Coverage in Wireless Sensor Networks
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
15 years 1 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
80
Voted
CSREASAM
2007
15 years 3 months ago
Intrusion Detection in Wireless Sensor Networks
Hong Nguyen, Ravi Palaniappan, Nevin Aydin, Shiyua...
73
Voted
WINSYS
2008
78views Business» more  WINSYS 2008»
15 years 3 months ago
Intrusion K-Coverage in Wireless Sensor Networks
Seyed Amir Yahyavi Firouz Abadi, Laleh Roostapoor,...
JHSN
2006
66views more  JHSN 2006»
15 years 1 months ago
Anomaly intrusion detection in wireless sensor networks
Vijay Bhuse, Ajay K. Gupta