Author:
Dankan Gowda V.,Jacob Suma Sira,Hussain Naziya,Chennappan R.,Sakhare D. T.
Publisher
Springer International Publishing
Reference21 articles.
1. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: Computers and communication (ISCC), IEEE symposium. IEEE, pp 180–187
2. Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the 2008 Spring simulation multi conference. Society for Computer Simulation International, pp 836–843
3. Penna M, Jijesh JJ, Shivashankar (2017) Design and implementation of automatic medicine dispensing machine. In: RTEICT 2017—2nd IEEE international conference on recent trends in electronics, information and communication technology, proceedings, pp 1962–1966. https://doi.org/10.1109/RTEICT.2017.8256941
4. Christin D, Reinhardt A, Mogre PS, Steinmetz R (2009) Wireless sensor networks and the internet of things: selected challenges. In: Proceedings of the 8th GI/ITG KuVS Fachespräch Drahtlose sensornetze, pp 31–34
5. Kishore DV, Shivashankar, Mehta S (2016) MANET topology for disaster management using wireless sensor network. In: International conference on communication and signal processing, ICCSP 2016, pp 0736–0740. https://doi.org/10.1109/ICCSP.2016.7754242
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Introduction;Studies in Systems, Decision and Control;2024