Author of the publication

A METHOD FOR DETECTING MULTIPLE ATTACKS AGAINST FALSE REPORT INJECTION ATTACKS AND WORMHOLE ATTACKS IN SENSOR NETWORKS

, and . Computer Applications: An International Journal (CAIJ), 1 (2): 1-10 (2014/11 2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs., and . WISA, volume 7115 of Lecture Notes in Computer Science, page 232-241. Springer, (2011)Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks., and . Ad Hoc Networks, (2016)A* -based layout design for gratings allocation., and . Comput. Aided Des., 40 (4): 455-464 (2008)A fuzzy rule-based path configuration method for LEAP in sensor networks., and . Ad Hoc Networks, (2015)Simulation Methodology-Based Context-Aware Architecture Design for Behavior Monitoring of Systems.. Symmetry, 12 (9): 1568 (2020)A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks., and . J. Parallel Distributed Comput., 69 (5): 441-450 (2009)Simulation Modeling of SAM Fuzzy Logic Controllers., , and . IEICE Trans. Inf. Syst., 93-D (7): 1984-1986 (2010)A Fuzzy Rule-Based Key Redistribution Method for Improving Security in Wireless Sensor Networks., and . IEICE Trans. Commun., 101-B (2): 489-499 (2018)Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System., and . AIS, volume 3397 of Lecture Notes in Computer Science, page 71-80. Springer, (2004)Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks., and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 573-583. Springer, (2007)