共 50 条
- [21] A Novel Trust Based Routing Protocol to prevent the Malicious Nodes in Wireless Sensor Networks. 2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 111 - 115
- [22] Efficient localization schemes in sensor networks with malicious nodes SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 190 - 196
- [23] Malicious Node Detection in Wireless Sensor Networks 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
- [24] Identification of Most Important Nodes in Wireless Sensor Networks Using Centralities IMPENDING INQUISITIONS IN HUMANITIES AND SCIENCES, ICIIHS-2022, 2024, : 295 - 299
- [25] Self-identification of boundary's nodes in wireless sensor networks Moustafa, Kouider Elouahed (moustafakouider@gmail.com), 2017, Korea Information Processing Society (13): : 128 - 140
- [26] Detecting and isolating malicious nodes in wireless ad hoc networks MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
- [27] Techniques to Identify and Eliminate Malicious Nodes in Cooperative Wireless Networks 2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
- [28] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280
- [30] Super Nodes For wireless Sensor Networks 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 90 - 95