Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference59 articles.
1. Rich Mobile Applications: Genesis, taxonomy, and open issues;Abolfazli;Journal of Network and Computer Applications,2014
2. D-SCIDS: distributed soft computing intrusion detection system;Abraham;J Netw Comput Appl,2007
3. An efficient routing algorithm to preserve k-coverage in wireless sensor networks;Ahmadi;J Supercomput,2013
4. Danger theory: the link between AIS and IDS?;Aickelin,2003
5. A survey on routing protocols for wireless sensor networks;Akkaya;Ad Hoc Netw,2005
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献