Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks
release_qvjzf2s5hvb2vc7feffnku2sxi
by
Sunil Gupta, Harsh Verma, A Sangal
Cited By
References to this release by other works.Showing 1 - 2 of 2 references (in 263ms) | ||
---|---|---|
via fuzzy |
Security in Smart Grids and Smart Spaces for Smooth IoT Deployment in 5G
[chapter]
Vasos Hadjioannou, Constandinos X. Mavromoustakis, George Mastorakis, Jordi Mongay Batalla, Ioannis Kopanakis, Emmanouil Perakakis, Spiros Panagiotakis 2016 Internet of Things (IoT) in 5G Mobile Technologies doi:10.1007/978-3-319-30913-2_16 |
web.archive.org [PDF]
|
via fuzzy |
Detection of Clone Attack in Wsn
Reyaz Ahmad sheikh, None, Rajeev kumar Arya, Mr.Shubhashish Goswami 2014 IOSR Journal of Computer Engineering doi:10.9790/0661-16554852 |
web.archive.org [PDF]
|