Author of the publication

Lifetime Optimizing Clustering Structure Using Archimedes' Spiral-Based Deployment in WSNs.

, and . IEEE Syst. J., 11 (2): 1039-1048 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure key design approaches using entropy harvesting in wireless sensor network: A survey., , and . J. Netw. Comput. Appl., (2017)A lightweight security scheme for query processing in clustered wireless sensor networks., and . Comput. Electr. Eng., (2015)Security issues and challenges in V2X: A Survey., and . Comput. Networks, (2020)Secure over-the-air software updates in connected vehicles: A survey., , and . Comput. Networks, (2020)Is Sensor Deployment Using Gaussian Distribution Energy Balanced?, and . ICA3PP (1), volume 8285 of Lecture Notes in Computer Science, page 58-71. Springer, (2013)Enhancing the lifespan of visual sensor networks using a predetermined node deployment strategy., and . ISCC, page 1-6. IEEE Computer Society, (2014)Secure over-the-air software update for connected vehicles., , and . Comput. Networks, (2022)Truck platoon security: State-of-the-art and road ahead., , , , , , and . Comput. Networks, (2021)Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents., , , , , , , and . Comput. Secur., (2022)μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks., , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)