From post

An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.

, , , , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 735-736. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Trust-Based Security Architecture for Ubiquitous Computing Systems., , , , , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 753-754. Springer, (2006)An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks., , , , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 735-736. Springer, (2006)Embedded Processor Security., , , , , , , , , и 6 other автор(ы). Security and Management, стр. 591-. CSREA Press, (2007)Security for Ubiquitous Computing: Problems and Proposed Solutionl., , , , , и . RTCSA, стр. 110-116. IEEE Computer Society, (2006)TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks., , , , и . CCNC, стр. 593-598. IEEE, (2007)UWB Spatial Multiplexing by Multiple Antennas and RAKE Decorrelation., и . ISWCS, стр. 272-276. IEEE, (2005)Transmission Time-Based Mechanism to Detect Wormhole Attacks., , , , и . APSCC, стр. 172-178. IEEE Computer Society, (2007)A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks., , , , и . ICON, стр. 188-193. IEEE, (2007)