X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (85) 85
Conference Proceeding (30) 30
Book Review (9) 9
Book Chapter (5) 5
Publication (4) 4
Dissertation (2) 2
Book / eBook (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
wireless sensor networks (30) 30
index medicus (28) 28
security (27) 27
compromised node (22) 22
humans (22) 22
compromised nodes (18) 18
computer science, information systems (15) 15
female (15) 15
telecommunications (15) 15
cryptography (11) 11
wireless sensor network (11) 11
authentication (10) 10
sensors (10) 10
wireless networks (10) 10
adult (9) 9
male (9) 9
middle aged (9) 9
research (9) 9
routing (9) 9
sensor networks (9) 9
aged (8) 8
computer science, theory & methods (8) 8
algorithms (7) 7
engineering, electrical & electronic (7) 7
health aspects (7) 7
monitoring (7) 7
networks (7) 7
protocols (7) 7
analysis (6) 6
cancer (6) 6
compromised node detection (6) 6
computer science (6) 6
computer science, hardware & architecture (6) 6
computer communication networks (5) 5
computer science, software engineering (5) 5
computer simulation (5) 5
disease (5) 5
en-route filtering (5) 5
false data (5) 5
false data injection (5) 5
intrusion detection (5) 5
remote sensors (5) 5
sensor phenomena and characterization (5) 5
surgery (5) 5
abridged index medicus (4) 4
ad hoc networks (4) 4
adolescent (4) 4
aged, 80 and over (4) 4
animals (4) 4
attacks (4) 4
compromised host (4) 4
compromised survival (4) 4
computer networks (4) 4
computer security (4) 4
data security (4) 4
detection (4) 4
engineering (4) 4
filtering (4) 4
fuzzy logic (4) 4
immunology (4) 4
infectious diseases (4) 4
oncology (4) 4
privacy (4) 4
retrospective studies (4) 4
risk factors (4) 4
software (4) 4
studies (4) 4
aids/hiv (3) 3
algorithm design and analysis (3) 3
attack (3) 3
care and treatment (3) 3
child (3) 3
classification (3) 3
coccidioidomycosis (3) 3
coccidioidomycosis - drug therapy (3) 3
communications engineering, networks (3) 3
compromised accounts (3) 3
compromised hosts (3) 3
diagnosis, differential (3) 3
en-route filtering scheme (3) 3
energy consumption (3) 3
energy efficiency (3) 3
extrathyroidal extension (3) 3
filtration (3) 3
hiv (3) 3
human immunodeficiency virus (3) 3
human-immunodeficiency-virus (3) 3
infection (3) 3
localization (3) 3
medicine & public health (3) 3
medicine, general & internal (3) 3
methods (3) 3
mobile ad hoc networks (3) 3
peer to peer computing (3) 3
routing protocols (3) 3
treatment outcome (3) 3
usage (3) 3
vectors (3) 3
abdominal surgery (2) 2
access control (2) 2
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Ad Hoc Networks, ISSN 1570-8705, 2007, Volume 5, Issue 3, pp. 289 - 298
Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of... 
Compromised nodes | Authentication | Intrusion detection | Mobile ad hoc networks | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS
Journal Article
Indian Journal of Science and Technology, ISSN 0974-6846, 2016, Volume 9, Issue 41
Journal Article
Journal of Computational Information Systems, ISSN 1553-9105, 06/2011, Volume 7, Issue 6, pp. 1823 - 1829
Journal Article
Lecture Notes in Electrical Engineering, ISSN 1876-1100, 2013, Volume 215, pp. 53 - 60
Conference Proceeding
IEEE International Conference on Communications, ISSN 0536-1486, 2008, pp. 1446 - 1450
Conference Proceeding
European Journal of Operational Research, ISSN 0377-2217, 07/2017, Volume 260, Issue 1, pp. 152 - 160
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 01/2016, Volume 59, pp. 88 - 94
Unlike traditional networks, the wireless sensor networks (WSNs) are very vulnerable to internal attacks from compromised nodes. The trust management system is... 
Trust evaluation | WSNs | Beta distribution | Compromised nodes | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | AUTHENTICATION SCHEME | Access control | Wireless sensor networks | Sensors
Journal Article
IEEE International Conference on Communications, ISSN 0536-1486, 2008, pp. 1499 - 1504
Conference Proceeding
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 01/2014, Volume 25, Issue 1, pp. 33 - 42
Network coding allows intermediate nodes to encode data packets to improve network throughput and robustness. However, it increases the propagation speed of... 
Pollution | Network coding | Educational institutions | Vectors | Encoding | Security | Equations | pollution attack | Byzantine attack | compromised nodes | security | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Fault tolerance (Computers) | Research | Data security | Mathematical analysis | Computational complexity | Analysis
Journal Article
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 04/2005, Volume 23, Issue 4, pp. 839 - 850
Journal Article
Information Sciences, ISSN 0020-0255, 01/2014, Volume 254, pp. 39 - 53
False data filtering is an important issue in wireless sensor networks. In this paper, we consider a new type of false data injection attacks called... 
Wireless sensor network | False data injection | Location information | Compromised node | Relative position | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | FILTERING SCHEME | Sensors
Journal Article
Journal Article
International Journal of Internet Technology and Secured Transactions, ISSN 1748-569X, 2010, Volume 2, Issue 1-2, pp. 88 - 108
The large deployment of wireless sensor networks (WSNs) increases their exposure to intrusions on sensor nodes. One of the most challenging issues is how to... 
Wireless sensor networks | GSPNs | Intrusion detection | SIDnet | WSNs | Generalised stochastic Petri nets | Heterogeneous networks | Security | Compromised node | Malicious node
Journal Article
International Journal of Pure and Applied Mathematics, ISSN 1311-8080, 2017, Volume 117, Issue 20, pp. 105 - 109
Journal Article
Journal of Information Processing, ISSN 0387-5806, 07/2015, Volume 23, Issue 4, pp. 476 - 487
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.