共 50 条
[21]
Fault-diagnosis and Decision Making Algorithm for Determining Faulty Nodes in Malicious and Dormant Wireless Sensor Networks
[J].
JOURNAL OF INTERNET TECHNOLOGY,
2018, 19 (07)
:2134-2144
[22]
Efficient and Lightweight Intrusion Detection Based on Nodes' Behaviours in Wireless Sensor Networks
[J].
2013 GLOBAL INFORMATION INFRASTRUCTURE SYMPOSIUM,
2013,
[23]
Determining the number of nodes for wireless sensor networks
[J].
PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2,
2004,
:501-504
[24]
A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA
[J].
2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS),
2022,
:860-865
[25]
Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
[J].
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES,
2017, 42 (02)
:143-151
[26]
Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
[J].
Measurement: Sensors,
2024, 36
[27]
Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
[J].
Sādhanā,
2017, 42
:143-151
[28]
Healing wireless sensor networks from malicious epidemic diffusion
[J].
2014 IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS 2014),
2014,
:171-178
[29]
Sybil Attack Detection In Wireless Sensor Networks
[J].
2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020),
2020,
[30]
Virtual movement of relay nodes for two-tier wireless sensor networks in tunnels
[J].
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,
2017, 13 (01)