Revistas
Artículos
Publicaciones
Documentos
REVISTA
Journal of Sensor and Actuator Networks
TODAS
Redirigiendo al acceso original de articulo en
23
segundos...
Inicio
/
Journal of Sensor and Actuator Networks
/
Vol: 2 Núm: 1 Pages Par: March (2013)
/
Artículo
ARTÍCULO
TITULO
Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks
Sung Yul Lim and Yoon-Hwa Choi
Resumen
-
Acceso
PÁGINAS
NÚMERO
Volumen: 2 Número: 1 Pages Parte: March (2013)
MATERIAS
INGENIERÍA Y CONSTRUCCIÓN CIVIL
REVISTAS SIMILARES
Applied Sciences
Information
Advances in Technology Innovation
DOI
https://doi.org/10.3390/jsan2010070
Artículos similares
Mobile Ad-Hoc Networks Security Review Paper
Acceso
Muaayed Al-Rawi
Pág. 73 - 76
Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc ne...
ver más
Revista:
International Journal of Open Information Technologies
GREEN COMP BASED ENERGY EFFICIENT DATA AGGREGATION ALGORITHM WITH MALICIOUS NODE IDENTIFICATION (GEED-M) FOR LIFETIME IMPROVEMENT IN WSN
Acceso
Nandoori Srikanth,Muktyala Siva Ganga Prasad
Random deployment of sensor nodes, energy limitations, interference of wireless links, and exposed nodes, are the major reasons of performance degradation in WSN. Energy efficiency, Lifetime improvements are the key research areas from last few decades. ...
ver más
Revista:
COMPUSOFT: An International Journal of Advanced Computer Technology
Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis
Acceso
Adam Rapley, Xavier Bellekens, Lynsay A. Shepherd and Colin McLean
Writing desktop applications in JavaScript offers developers the opportunity to create cross-platform applications with cutting-edge capabilities. However, in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
ver más
Revista:
Informatics
Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network
Acceso
Jinhua Ma, Zhide Chen, Jianghua Liu and Rongjun Zheng
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious worms are getting more and more serious. By considering the influences of the network heterogeneity on worm spreading, we are the first to study the complex ...
ver más
Revista:
Information
Revistas destacadas
Infrastructures
Informed Infraestructure
BiT
Revista de la Construcción
Ver todas las revistas