Enhanced approach using trust based decision making for secured wireless streaming video sensor networks
暂无分享,去创建一个
[1] K. Dhanalakshmi,et al. Farmbot-a Smart Agriculture Assistor Using Internet of Things , 2018 .
[2] Andreas Willig,et al. Data Transport Reliability in Wireless Sensor Networks. A Survey of Issues and Solutions , 2005, PIK Prax. Informationsverarbeitung Kommun..
[3] P. Punitha,et al. Certain Investigation on Power Preservation in Sensor Networks , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).
[4] Hongyu Pei Breivold,et al. Internet of Things for Industrial Automation -- Challenges and Technical Solutions , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.
[5] Victor C. M. Leung,et al. Optimal Resource Allocation for Green and Clustered Video Sensor Networks , 2018, IEEE Systems Journal.
[6] Jacques M. Bahi,et al. A Security Framework for Wireless Sensor Networks: Theory and Practice , 2014, 2014 IEEE 23rd International WETICE Conference.
[7] Minghao Yin,et al. Animal migration optimization: an optimization algorithm inspired by animal migration behavior , 2014, Neural Computing and Applications.
[8] Song Han,et al. Wireless Multimedia Sensor Networks Applications and Security Challenges , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[9] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[10] C. Sivaparthipan,et al. Demonetization: a Visual Exploration and Pattern Identification of People Opinion on Tweets , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).
[11] S. Senthilkumar,et al. A Survey on Trust Management for Mobile Ad Hoc Networks , 2018 .
[12] Yuguang Fang,et al. Multiconstrained QoS multipath routing in wireless sensor networks , 2008, Wirel. Networks.
[13] Jamal N. Al-Karaki,et al. Wireless Multimedia Sensor Networks: Current Trends and Future Directions , 2010, Sensors.
[14] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[15] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[16] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[17] Chang-Gun Lee,et al. MMSPEED: multipath Multi-SPEED protocol for QoS guarantee of reliability and. Timeliness in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.
[18] S. Sivaranjani,et al. ----------------------------------------------------------------------------------------------------------------IDENTIFYING FAKE USER ’ S IN SOCIAL NETWORKS USING NON VERBAL BEHAVIOR , 2015 .
[19] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[20] Dijiang Huang,et al. RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[21] Ian F. Akyildiz,et al. Cross-Layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[22] Marion Souil,et al. Contribution to quality of service in wireless sensor networks. (Contribution à la qualité de service dans les réseaux de capteurs sans fil) , 2013 .
[23] Gunasekaran Manogaran,et al. Intelligent security algorithm for UNICODE data privacy and security in IOT , 2018, Service Oriented Computing and Applications.
[24] S. Karthik,et al. Designing statistical assessment healthcare information system for diabetics analysis using big data , 2018, Multimedia Tools and Applications.
[25] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[26] C.B. Sivaparthipan,et al. Eshopping Scam Identification using Machine Learning , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).
[27] Md.Asdaque Hussain,et al. WSN research activities for military application , 2009, 2009 11th International Conference on Advanced Communication Technology.
[28] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[29] Huadong Ma,et al. Some problems of directional sensor networks , 2007, Int. J. Sens. Networks.
[30] Rajesh Patel,et al. Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network , 2011 .
[31] M. BalaAnand,et al. Designing a Framework for Communal Software: Based on the Assessment Using Relation Modelling , 2018, International Journal of Parallel Programming.
[32] V Geetha,et al. A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network , 2014 .
[33] Kwangjo Kim,et al. State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[34] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[35] Jacques M. Bahi,et al. Secure Scheduling of Wireless Video Sensor Nodes for Surveillance Applications , 2011, ADHOCNETS.
[36] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[37] Ian F. Akyildiz,et al. Correlation-Aware QoS Routing for Wireless Video Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[38] Yang Liu,et al. An energy-efficient QoS-aware media access control protocol for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..