Author of the publication

Is Sensor Deployment Using Gaussian Distribution Energy Balanced?

, and . ICA3PP (1), volume 8285 of Lecture Notes in Computer Science, page 58-71. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks., , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN., , , , and . ICCSA (3), volume 6018 of Lecture Notes in Computer Science, page 321-335. Springer, (2010)Secure over-the-air software update for connected vehicles., , and . Comput. Networks, (2022)Truck platoon security: State-of-the-art and road ahead., , , , , , and . Comput. Networks, (2021)SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT., , , and . CNS, page 1-9. IEEE, (2023)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)Energy-Balancing and Lifetime Enhancement of Wireless Sensor Network with Archimedes Spiral., , , and . UIC, volume 6905 of Lecture Notes in Computer Science, page 420-434. Springer, (2011)DSLs and Middleware Platforms in a Model-Driven Development Approach for Secure Predictive Maintenance Systems in Smart Factories., , , and . ISoLA, volume 13036 of Lecture Notes in Computer Science, page 146-161. Springer, (2021)Secure key design approaches using entropy harvesting in wireless sensor network: A survey., , and . J. Netw. Comput. Appl., (2017)Security issues and challenges in V2X: A Survey., and . Comput. Networks, (2020)