Architecture for Application Autonomic Protection Principles in Wireless Sensor Network
暂无分享,去创建一个
[1] Lili Yang. Determining Sink Node Locations in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[2] Mohamed F. Younis,et al. A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[3] Chien-Chung Shen,et al. Sensor information networking architecture and applications , 2001, IEEE Wirel. Commun..
[4] B. Otis,et al. PicoRadios for wireless sensor networks: the next challenge in ultra-low power design , 2002, 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315).
[5] Qutaiba Ibrahem Ali,et al. Simulation & performance study of wireless sensor network (WSN) using MATLAB , 2010, 2010 1st International Conference on Energy, Power and Control (EPC-IQ).
[6] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[7] Martina Zitterbart,et al. Security in Sensor Networks , 2010, it Inf. Technol..
[8] Chien-Chung Shen,et al. Sensor Network Architecture and Applications , 2004, Handbook of Sensor Networks.
[9] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[10] Ira S. Moskowitz,et al. A new paradigm hidden in steganography , 2001, NSPW '00.
[11] Yutaka Murakami,et al. Channel synthesized modulation employing singular vector for secured access on physical layer , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).