Author of the publication

Detecting Wormhole Attacks in Wireless Sensor Networks.

, , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Unofficial Information Propagation., , , , and . ICICS, volume 4861 of Lecture Notes in Computer Science, page 113-125. Springer, (2007)Mobile Anchor-Free Localization for Wireless Sensor Networks., , , , and . DCOSS, volume 4549 of Lecture Notes in Computer Science, page 96-109. Springer, (2007)A BP-Neural Network Improvement to Hop-Counting for Localization in Wireless Sensor Networks., , , and . Tools and Applications with Artificial Intelligence, volume 166 of Studies in Computational Intelligence, Springer, (2009)Requirements for implementation of localization into real-world assistive environments., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 13. ACM, (2008)A wireless sensor network architecture and its application in an assistive environment., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 25. ACM, (2008)Anchor-Free Localization in Mixed Wireless Sensor Network Systems.. Dartmouth College, USA, (2008)GDL: A Geographic Distributed Localization Algorithm for Wireless Sensor Networks., , and . ICCCN, page 155-160. IEEE, (2006)Mobile device protection from loss and capture., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 41. ACM, (2008)A Feature Extraction Metod for Multimedia data Analysis in Robot Wireless Sensor Networks., , , , , and . WIAMIS, page 79. IEEE Computer Society, (2007)Detecting Wormhole Attacks in Wireless Sensor Networks., , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)