Author:
Deepak S. Prem Kumar,Mukesh Krishnan M. B.
Publisher
Springer International Publishing
Reference14 articles.
1. M. R. Ahmed, X. Huang, and H. Cui, "Mrakov Chain Monte Carlo Based Internal Attack Evaluation for Wireless Sensor Network," into J. Comput. Sci. Netw. Secur., vol. 13, no. 3, pp. 23-31, Mar. 2013.
2. S. M. ManasKhatua, "CURD: Controllable reactive jamming detection in underwater sensor networks," Pervasive Mob. Comput.,2014.
3. J.-H. Cui, 1. Kong, M. Gerla, and S. Zhou, "The challenges of building mobile underwater wireless networks for aquatic applications," IEEE Networks., vol. 20, no. 3, pp. 12-18, May 2006.
4. M. C. Domingo, "Securing underwater wireless communication networks," Wire!' Commun.iEEE, no. I, pp. 22 - 28,2011
5. A. G. Ahmed, M. Aseeri, and M. R. Ahmed, "A Novel Trust and Reputation Model Based WSN Technology to Secure Border Surveillance," vol. 2, no. 3, pp. 263 - 265, Jun. 2013.