Sciweavers

51 search results - page 5 / 11
» Intrusion K-Coverage in Wireless Sensor Networks
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
CSREASAM
2007
14 years 11 months ago
Intrusion Detection in Wireless Sensor Networks
Hong Nguyen, Ravi Palaniappan, Nevin Aydin, Shiyua...
53
Voted
WINSYS
2008
78views Business» more  WINSYS 2008»
14 years 11 months ago
Intrusion K-Coverage in Wireless Sensor Networks
Seyed Amir Yahyavi Firouz Abadi, Laleh Roostapoor,...
63
Voted
JHSN
2006
66views more  JHSN 2006»
14 years 10 months ago
Anomaly intrusion detection in wireless sensor networks
Vijay Bhuse, Ajay K. Gupta