From post

PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network.

, , и . ICESS, том 4523 из Lecture Notes in Computer Science, стр. 530-539. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Context based Detections against Legal False Price Data and Malicious Disconnect Commands in Smart Grid., , и . ICCSA (6), стр. 1-9. IEEE, (2018)Multidimensional Trust-Based Anomaly Detection System in Internet of Things., , , и . WASA, том 10251 из Lecture Notes in Computer Science, стр. 302-313. Springer, (2017)PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network., , и . ICESS, том 4523 из Lecture Notes in Computer Science, стр. 530-539. Springer, (2007)Social recommendation using quantified social tie strength., , и . ICACI, стр. 84-88. IEEE, (2015)A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure., , , и . IEEE Trans. Smart Grid, 6 (5): 2435-2443 (2015)A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks With Fine-Grained Flow Classification., , , , и . IEEE Internet Things J., 9 (20): 19599-19614 (2022)Reputation Mechanism for Inter-domain Routing Security Management., , и . CIT (2), стр. 98-103. IEEE Computer Society, (2009)978-0-7695-3836-5.A Self-Powered Hybrid SSHI Circuit with a Wide Operation Range for Piezoelectric Energy Harvesting., , и . Sensors, 21 (2): 615 (2021)Successive direct load altering attack in smart grid., , , и . Comput. Secur., (2018)CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack., , , , , , и . Comput. Secur., (2021)