×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [compromised nodes]
Home >
compromised nodes
A Dynamic En-route Filtering Scheme for Data
142 views
Security issues
416 views
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Presenter: Dinesh Reddy Gudibandi.
217 views
015 spins
342 views
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE VOTE AND REPORT INJECTION ATTACKS
85 views
Security Issues in MANET
373 views
Welcome to International Journal of Engineering Research and Development (IJERD)
462 views
A security method for multiple attacks in sensor networks against the false report injection attack and the sinkhole attack
244 views
Ensp energy efficient next hop selection in a probabilistic voting based filtering scheme using fuzzy logic
41 views
Redundancy Management in Heterogeneous Wireless Sensor Networks
220 views
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
25 views
ENERGY-EFFICIENT PATH CONFIGURATION METHOD FOR DEF IN WSNS
4 views
Next >