Fuzzy-Based Reliability Prediction Model for Secure Routing Protocol Using GA and TLBO for Implementation of Black Hole Attacks in WSN
暂无分享,去创建一个
Mohammad Bagher Tavakoli | Masoud Moradkhani | Sajad Nosratian | M. Tavakoli | M. Moradkhani | S. Nosratian
[1] Yaya Sudarya Triana,et al. Blowfish algorithm and Huffman compression for data security application , 2018, IOP Conference Series: Materials Science and Engineering.
[2] Kaoru Hirota,et al. ON A LOSSY IMAGE COMPRESSION/RECONSTRUCTION METHOD BASED ON FUZZY RELATIONAL EQUATIONS , 2004 .
[3] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[4] Babak Mazloom-Nezhad Maybodi,et al. An Energy-Efficient Clustering Algorithm Using Fuzzy C-Means and Genetic Fuzzy System for Wireless Sensor Network , 2017, J. Circuits Syst. Comput..
[5] D. Huffman. A Method for the Construction of Minimum-Redundancy Codes , 1952 .
[6] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[7] Ching-Han Chen,et al. Designing and Implementing a Lightweight WSN MAC Protocol for Smart Home Networking Applications , 2017, J. Circuits Syst. Comput..
[8] Wei Liu,et al. Improved adaptive genetic algorithm for the vehicle Insurance Fraud Identification Model based on a BP Neural Network , 2020, Theor. Comput. Sci..
[9] Muhammad Usman,et al. SIT: A Lightweight Encryption Algorithm for Secure Internet of Things , 2017, ArXiv.
[10] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1992 .
[11] Yi Pan,et al. Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks , 2013, Theor. Comput. Sci..
[12] T. Nishitani,et al. VLSI architectures for discrete wavelet transforms , 1993, IEEE Trans. Very Large Scale Integr. Syst..