Malicious Node Detection and Path Malicious Node Detection and Path Malicious Node Detection and Path Malicious Node Detection and Path Optimization: Optimization: Optimization: A R A R eview
暂无分享,去创建一个
[1] Neeru Singla. A Dynamic Network Reconstruction Approach using ACO , 2012 .
[2] Ganesh K. Venayagamoorthy,et al. Particle Swarm Optimization in Wireless-Sensor Networks: A Brief Survey , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[3] Anna Felkner. How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .
[4] Tzung-Pei Hong,et al. Allocating Multiple Base Stations under General Power Consumption by the Particle Swarm Optimization , 2007, 2007 IEEE Swarm Intelligence Symposium.
[5] Huafeng Wu,et al. Event-based Trust Framework Model in Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.
[6] Zulfiqar Ali,et al. Analysis of Routing Protocols in AD HOC and Sensor Wireless Networks Based on Swarm Intelligence , 2013 .
[7] Muddassar Farooq,et al. Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions , 2011, Inf. Sci..
[8] Mohammed Bouhorma,et al. New Routing Algorithm Based on ACO Approach for Lifetime Optimization in Wireless Sensor Networks , 2012 .
[9] Derviş Karaboğa,et al. Artificial bee colony algorithm for dynamic deployment of wireless sensor networks , 2012, Turkish Journal of Electrical Engineering and Computer Sciences.
[10] Yoon-Hwa Choi,et al. Neighbor-Based Malicious Node Detection in Wireless Sensor Networks , 2012 .
[11] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[12] Yenumula B. Reddy,et al. TRUST -BASED APPROACH IN WIRELESS SENSOR NETWORKS USING AN AGENT TO EACH CLUSTER , 2012 .
[13] Gianluca Aloi,et al. Particle swarm optimization schemes based on consensus for wireless sensor networks , 2012, PM2HW2N '12.