Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks release_qvjzf2s5hvb2vc7feffnku2sxi

by Sunil Gupta, Harsh Verma, A Sangal

Cited By

References to this release by other works.
Fuzzy reference matching is a work in progress!
Read more about quality, completeness, and caveats in the fatcat guide.
Showing 1 - 2 of 2 references (in 263ms)

via fuzzy
Security in Smart Grids and Smart Spaces for Smooth IoT Deployment in 5G [chapter]
Vasos Hadjioannou, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla, Ioannis Kopanakis, Emmanouil Perakakis, Spiros Panagiotakis
2016   Internet of Things (IoT) in 5G Mobile Technologies
doi:10.1007/978-3-319-30913-2_16 
web.archive.org [PDF]

via fuzzy
Detection of Clone Attack in Wsn
Reyaz Ahmad sheikh, None, Rajeev kumar Arya, Mr.Shubhashish Goswami
2014   IOSR Journal of Computer Engineering
doi:10.9790/0661-16554852 
web.archive.org [PDF]