@dblp

Mitigating byzantine attacks in data fusion process for wireless sensor networks using witnesses.

, , and . ICCS, page 263-267. IEEE, (2014)

Links and resources

Tags