Author:
Fouad Mohamed Mostafa M.,Hassanien Aboul Ella
Publisher
Springer Berlin Heidelberg
Reference48 articles.
1. http://www.itu.int
(2014). Accessed 16 Jan 2014
2. I.-T.R. X.800: Security Architecture for Open Systems Interconnection for CCITT Applications, Geneva (1991)
3. Ozgur, A., Lévêque, O., Tse, D.: Spatial degrees of freedom of large distributed MIMO systems and wireless ad hoc networks. IEEE J. Sel. Areas Commun. 31(2), 202–214 (2013)
4. Yassine, M., Ezzati, A.: A review of security attacks and intrusion detection schemes in wireless sensor network. Int. J. Wireless Mob. Netw. 5(6), 79 (2013)
5. Aashima, S., Sachdeva, R.: Review on security issues and attacks in wireless sensor networks. Int. J. 10(1), 1–24 (2013)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An improved two-way secure key supervision (tsks) scheme for secure scada;Materials Today: Proceedings;2021-03
2. Security Services;Encyclopedia of Database Systems;2018
3. Maximizing Lifetime of Wireless Sensor Networks Based on Whale Optimization Algorithm;Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017;2017-08-31
4. Security Services;Encyclopedia of Database Systems;2017
5. Big Data Pre-processing Techniques Within the Wireless Sensors Networks;Proceedings of the Second International Afro-European Conference for Industrial Advancement AECIA 2015;2016