kw.\*:("Attaque du siphon")
Results 1 to 3 of 3
Selection :
ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor networkAMBIKA, N; RAJU, G. T.International journal of security and networks (Print). 2014, Vol 9, Num 2, pp 78-84, issn 1747-8405, 7 p.Article
Eliminating rouge femtocells based on distance bounding protocol and geographic informationCHEN, Chien-Ming; CHEN, Yao-Hsin; LIN, Yue-Hsun et al.Expert systems with applications. 2014, Vol 41, Num 2, pp 426-433, issn 0957-4174, 8 p.Article
A novel agent-based approach to detect sinkhole attacks in wireless sensor networksHAMEDHEIDARI, Sina; RAFEH, Reza.Computers & security. 2013, Vol 37, pp 1-14, issn 0167-4048, 14 p.Article