Wireless Sensor Network

Wireless Sensor Network

ISSN Print: 1945-3078
ISSN Online: 1945-3086
www.scirp.org/journal/wsn
E-mail: wsn@scirp.org
"Classification and Review of Security Schemes in Mobile Computing"
written by Sathish Alampalayam Kumar,
published by Wireless Sensor Network, Vol.2 No.6, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Hacking an Aircraft: Hacking the In-flight Entertainment System
Advances in Networks, 2022
[2] WebAssembly Modules as Lightweight Containers for Liquid IoT Applications
International Conference on Web Engineering, 2021
[3] WebAssembly Modules as Lightweight Containers for Liquid IoT Applications.
2021
[4] A survey on the blockchain techniques for the Internet of Vehicles security
Transactions on Emerging Telecommunications Technologies, 2021
[5] Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for …
2020
[6] A Survey of Intelligent Transportation Systems Security: Challenges and Solutions
2020
[7] A Machine Learning Based Approach to Detect
2020
[8] Evaluation of classification algorithms for distributed denial of service attack detection
2020
[9] A NOVEL SECURITY MODEL BASED ON TRUST TO SECURE MOBILE AGENTS IN PRAXIS OF MOBILE ADHOC NETWORKS
2019
[10] A Machine Learning Based Approach to Detect Malicious Fast Flux Networks
2018
[11] Vulnerability Analysis of Mobile Agents Praxis in Mobile
2017
[12] Vulnerability Assessment for Security in Aviation Cyber-Physical Systems
2017
[13] AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV ROUTING PROTOCOL
International Journal in Foundations of Computer Science & Technology, 2017
[14] Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks
International Journal of Computer Applications Foundation of Computer Science, 2017
[15] Reputation detection based on incomplete β distribution for mobile agent in wireless sensor networks
International Journal of Distributed Sensor Networks, 2017
[16] Securing IoT-based Cyber-Physical Human Systems against Collaborative Attacks
2017
[17] A Cloud-Based Service Delivery Platform for Effective Homeland Security
2017
[18] A Comparative Analysis of Jellyfish Attacks and Black Hole Attack with Selfish Behavior Attack under AODV Routing Protocol
2017
[19] A study of research trends and issues in wireless ad hoc networks
Handbook of Research on Progressive Trends in Wireless Communications and Networking, 2016
[20] A Survey on the Security Features of Cryptographic Techniques in Mobile Devices
2016
[21] Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
International Journal of Computer Network and Information Security(IJCNIS), 2015
[22] Review of a Secure Approach to Prevent Packet Dropping and Message Tampering Attacks on AODV-based MANETs
International Journal of Computer Science and Information Technologies, 2015
[23] RECONFIGURABLE ARCHITECTURE FOR AUDIO WATERMARKING USING EMD
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY, 2015
[24] A study of research trends and rends and rends and issues in wireless ad hoc networks
2014
[25] Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc
Doctoral dissertation, Facultad de Informática, 2014
[26] ROLE OF HEAT OF HYDRATION IN ATTAINING EARLY STRENGTH GAIN OF CEMENT IN CONCRETE
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY, 2014
[27] Performance study of security mechanism for mobile agent domain
Master’s Thesis,Blekinge Institute of Technology, 2011
[28] Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks
2010
[29] Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobil Ad Hoc Networks
2010
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top