From post

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS

, и . Advances in Vision Computing: An International Journal (AVC), 3 (3): 8 (сентября 2016)
DOI: 10.5121/avc.2016.3302

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A fuzzy rule-based path configuration method for LEAP in sensor networks., и . Ad Hoc Networks, (2015)Modeling and Simulation of Abnormal Behavior Detection Through History Trajectory Monitoring in Wireless Sensor Networks., и . IEEE Access, (2022)Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks., и . Wirel. Networks, 21 (8): 2799-2809 (2015)A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks., и . IEICE Trans. Commun., 101-B (2): 489-499 (2018)Simulation Modeling of SAM Fuzzy Logic Controllers., , и . IEICE Trans. Inf. Syst., 93-D (7): 1984-1986 (2010)Simulation Methodology-Based Context-Aware Architecture Design for Behavior Monitoring of Systems.. Symmetry, 12 (9): 1568 (2020)A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy Efficiency, and Filtering in WSNs., и . Ad Hoc Sens. Wirel. Networks, 35 (1-2): 129-149 (2017)PKSM: Pre-key Distribution and Sink Mobility in Commutative Cipher Based En-route Filtering to Extend the Network Lifetime in WSNs., и . Ad Hoc Sens. Wirel. Networks, 42 (1-2): 19-33 (2018)Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System., и . AIS, том 3397 из Lecture Notes in Computer Science, стр. 71-80. Springer, (2004)Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks., и . ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 573-583. Springer, (2007)