Author of the publication

A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs.

, and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 682-696. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security issues and challenges in V2X: A Survey., and . Comput. Networks, (2020)Secure over-the-air software updates in connected vehicles: A survey., , and . Comput. Networks, (2020)A lightweight security scheme for query processing in clustered wireless sensor networks., and . Comput. Electr. Eng., (2015)Secure key design approaches using entropy harvesting in wireless sensor network: A survey., , and . J. Netw. Comput. Appl., (2017)Is Sensor Deployment Using Gaussian Distribution Energy Balanced?, and . ICA3PP (1), volume 8285 of Lecture Notes in Computer Science, page 58-71. Springer, (2013)Enhancing the lifespan of visual sensor networks using a predetermined node deployment strategy., and . ISCC, page 1-6. IEEE Computer Society, (2014)Truck platoon security: State-of-the-art and road ahead., , , , , , and . Comput. Networks, (2021)Secure over-the-air software update for connected vehicles., , and . Comput. Networks, (2022)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks., , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)