Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference18 articles.
1. Alduais N, Abdullah J, Jamil A, Audah L, Alias R (2017) Sensor node data validation techniques for realtime IOT/WSN application. In: 2017 14th International multi-conference on systems, signals & devices (SSD). IEEE, pp 760–765
2. Anwar RW, Bakhtiari M, Zainal A, Abdullah AH, Qureshi KN (2014) Security issues and attacks in wireless sensor network. World Appl Sci J 30(10):1224–1227
3. Box GE, Cox DR (1964) An analysis of transformations. J R Stat Soc Ser B Methodol 26(2):211–243
4. Cai H, Venkatasubramanian KK (2018) Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems. EURASIP J Inf Secur 1:13
5. Chou YM, Mason RL, Young JC (2001) The control chart for individual observations from a multivariate non-normal distribution. Commun Stat Theory Methods 30(8–9):1937–1949
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献