A study of shading effect on photovoltaic modules with proposed P & O checking algorithm
暂无分享,去创建一个
Tole Sutikno | Rozana Alik | Awang Jusoh | A. Jusoh | T. Sutikno | R. Alik
[1] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[2] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[3] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[4] Kalpana Sharma,et al. Cross Layer Security Framework for Wireless Sensor Networks , 2011 .
[5] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[6] Aikaterini Mitrokotsa,et al. Intrusion Detection Techniques in Sensor Networks , 2008 .
[7] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[8] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[9] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[10] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[11] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Drago Zagar,et al. Security in IPv6-based wireless sensor network — Precision agriculture example , 2013, Proceedings of the 12th International Conference on Telecommunications.
[13] Neeli R. Prasad,et al. Security Framework for Wireless Sensor Networks , 2006, Wirel. Pers. Commun..
[14] Krešimir Grgić,et al. Wireless Sensor Networks - Applications and Development , 2007 .
[15] Snjezana Rimac-Drlje,et al. Security aspects in IPv6 networks - implementation and testing , 2007, Comput. Electr. Eng..
[16] Wen-Chung Chang,et al. Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.
[17] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[18] Nicolas Sklavos. On the Hardware Implementation Cost of Crypto-Processors Architectures , 2010, Inf. Secur. J. A Glob. Perspect..
[19] Drago Zagar,et al. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks , 2016, J. Sensors.
[20] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[21] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[22] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[23] Claudia Eckert,et al. On handling insider attacks in wireless sensor networks , 2008 .