[1]
|
Enhancing Network Lifetime of WSNs through the Implementation of a Modified Ant Colony Optimization Algorithm
Procedia Computer Science,
2023
DOI:10.1016/j.procs.2023.12.092
|
|
|
[2]
|
Cybersecurity in Smart Homes
2022
DOI:10.1002/9781119987451.ch4
|
|
|
[3]
|
Improving the Precision of Data by segregating Malicious Node from Sensor Network's
2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS),
2021
DOI:10.1109/ICICCS51141.2021.9432194
|
|
|
[4]
|
Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
Wireless Personal Communications,
2020
DOI:10.1007/s11277-020-07291-5
|
|
|
[5]
|
Cyber Attack Detection In Smart Grid Substation Using Virtual Range Increment And Trust Weight
2019 8th International Conference on Power Systems (ICPS),
2019
DOI:10.1109/ICPS48983.2019.9067396
|
|
|
[6]
|
In Situ Calibration Algorithms for Environmental Sensor Networks: A Review
IEEE Sensors Journal,
2019
DOI:10.1109/JSEN.2019.2910317
|
|
|
[7]
|
An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks
International Journal of Communication Systems,
2019
DOI:10.1002/dac.3878
|
|
|
[8]
|
An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
International Journal of Communication Systems,
2018
DOI:10.1002/dac.3878
|
|
|
[9]
|
A Survey on Sensor Calibration in Air Pollution Monitoring Deployments
IEEE Internet of Things Journal,
2018
DOI:10.1109/JIOT.2018.2853660
|
|
|
[10]
|
Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks
IEEE Internet of Things Journal,
2017
DOI:10.1109/JIOT.2016.2560518
|
|
|
[11]
|
Proposed identification algorithm of evil nodes in WSN
2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT),
2017
DOI:10.1109/CRCSIT.2017.7965552
|
|
|
[12]
|
A Novel Cluster Head Selection Algorithm for Energy-Efficient Routing in Wireless Sensor Network
2016 IEEE 6th International Conference on Advanced Computing (IACC),
2016
DOI:10.1109/IACC.2016.114
|
|
|
[13]
|
Agent based trusted neighbor identification in Wireless Sensor Networks
AI Communications,
2015
DOI:10.3233/AIC-150673
|
|
|
[14]
|
Existence of dumb nodes in stationary wireless sensor networks
Journal of Systems and Software,
2014
DOI:10.1016/j.jss.2013.12.039
|
|
|
[15]
|
Trusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents
Wireless Personal Communications,
2014
DOI:10.1007/s11277-014-1704-4
|
|
|
[16]
|
Real-World Wireless Sensor Networks
Lecture Notes in Electrical Engineering,
2014
DOI:10.1007/978-3-319-03071-5_3
|
|
|
[17]
|
Real-World Wireless Sensor Networks
Lecture Notes in Electrical Engineering,
2014
DOI:10.1007/978-3-319-03071-5_3
|
|
|