Subject
Signal Processing,Control and Systems Engineering,Software
Reference7 articles.
1. Blundo, C., De Santis, A., Herzberg, A., Kutten, Sh., Vaccaro, U., and Yung, M., Perfectly secure key distribution for dynamic conferences, Inf. Comput., 1998, vol.146, no. 1, pp. 1–23. https://doi.org/10.1006/inco.1998.2717
2. Mik, Ch.I., What is wireless sensor network (WSN): Structure, classification, and topologies, 2019. http://digitrode.ru/articles/2015-chto-takoe-besprovodnaya-sensornaya-set-wsn-struktura-klassifikaciya-topologii.html.
3. Lecture Notes in Computer Science;R. Blom,1985
4. Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability, London, 2020, IEEE, 2020, pp. 81–85. https://doi.org/10.1109/WorldS450073.2020.9210421
5. Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976. https://doi.org/10.3103/S0146411618080084