Author:
Rouissi Nejla,Gharsellaoui Hamza,Bouamama Sadok
Reference21 articles.
1. X. Huang, D. Sharma, M. Ahmed, Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks. 12th International Conference on Algorithms and Architectures for Parallel Processing. Fukuoka, Japan, 2012.
2. TCNPR: Trust Calculation based on Nodes Properties and Recommendations for Intrusion Detection in Wireless Sensor Network;Dhakne;IJCSNS International Journal of Computer Science and Network Security,,2016
3. Momani M. Bayesian, Methods for Modelling and Management of Trust in Wireless Sensor Networks, Ph.D. Thesis, University of Tech- nology, Sydney, 2008.
4. Lopez. J, Roman. R, Agudo. I, Fernandez-Gago. C, Trust Management Systems for Wireless Sensor Networks: Best Practices, Computer Communications, 2010.
5. Nejla. Rouissi, Hamza. Gharsellaoui, Improved Hybrid LEACH Based Approach for Preserving Secured Integrity in Wireless Sensor Net- works, International Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017, Marseille France, 2017.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献