has been cited by the following article(s):
[1]
|
Secure Routing Protocol for Wireless Sensor Networks: Survey
2022 8th International Engineering Conference on Sustainable Technology and Development (IEC),
2022
DOI:10.1109/IEC54822.2022.9807582
|
|
|
[2]
|
Security and application of wireless sensor network
Procedia Computer Science,
2021
DOI:10.1016/j.procs.2021.02.088
|
|
|
[3]
|
Data dissemination for Internet of vehicle based on 5G communications: A survey
Transactions on Emerging Telecommunications Technologies,
2020
DOI:10.1002/ett.3881
|
|
|
[4]
|
Data dissemination for Internet of vehicle based on 5G communications: A survey
Transactions on Emerging Telecommunications Technologies,
2020
DOI:10.1002/ett.3881
|
|
|
[5]
|
Comparison of Data-Driven Models for Cleaning eHealth Sensor Data: Use Case on ECG Signal
Wireless Personal Communications,
2020
DOI:10.1007/s11277-020-07435-7
|
|
|
[6]
|
Trust model for wireless network security based on the edge computing
Microsystem Technologies,
2019
DOI:10.1007/s00542-019-04459-3
|
|
|
[7]
|
A Study of Limited Resources and Security Adaptation for Extreme Area in Wireless Sensor Networks
Journal of Physics: Conference Series,
2019
DOI:10.1088/1742-6596/1244/1/012013
|
|
|
[8]
|
Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework
Sensors,
2018
DOI:10.3390/s18051594
|
|
|