Author of the publication

Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique.

, , , , and . ICNS, page 83. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated System for Malicious Node Discovery and Self-destruction in Wireless Sensor Networks., , , , , and . CoRR, (2018)Identification of Distributed Parameter Systems based on Multivariable Estimation and Wireless Sensor Networks.. WINSYS, page 92-95. INSTICC Press, (2008)Efficiency improvement in multi-sensor wireless network based estimation algorithms for distributed parameter systems with application at the heat transfer., and . EURASIP J. Adv. Signal Process., (2013)Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments., , , , , , , , and . CoRR, (2018)A 2D chaotic path planning for mobile robots accomplishing boundary surveillance missions in adversarial conditions., and . Commun. Nonlinear Sci. Numer. Simul., 19 (10): 3617-3627 (2014)Frequency Control for Ultrasonic Piezoelectric Transducers, based on the Movement Current.. ICINCO-SPSMC, page 194-199. INSTICC Press, (2008)Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique., , , , and . ICNS, page 83. IEEE Computer Society, (2007)Ensemble based sensing anomaly detection in wireless sensor networks., and . Expert Syst. Appl., 39 (10): 9087-9096 (2012)Novel Bioinspired Approach Based on Chaotic Dynamics for Robot Patrolling Missions with Adversaries., , , and . Entropy, 20 (5): 378 (2018)Knowledge based System for Reliable Perimeter Protection using Sensor Networks., , , , and . WINSYS, page 51-56. INSTICC Press, (2007)