Author:
Soni Santosh,Shrivastava Manish
Reference21 articles.
1. Nema, A., Tiwari, B., Tiwari, V.: Improving accuracy for intrusion detection through layered approach using support vector machine with feature reduction. In: Proceedings of the ACM Symposium on Women in Research 2016, pp. 26–31, ACM (2016)
2. Boukerche, A., Oliveira, H.A.B.F., Nakamura, E.F., Loureiro, A.A.F.: Secure localization algorithms for wireless sensor networks. IEEE Commun. Mag. 08, 96–101 (2008)
3. Güvenc, I., Chong, C.-C.: A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Commun. Surv. Tutor. 11(3), 107–124 (2009)
4. Nick, I., Paprotny, I.: Review and comparison of spatial localization methods for low power wireless sensor networks. IEEE Sens. J. 15(10), 5971–5987 (2015)
5. Goyal, S., Bhatia, T., Verma, A.K.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1463–1468, INDIACom (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献