Előző oldalÖsszesen 72 elem 1 oldalon, 72 listázva, a(z) 1. oldal megjelenítve.Következő oldalÁtlépés a keresőbeIn English
Megjelenítési opciók
Marco Beccuti et al. A Mean Field Based Methodology for Modeling Mobility in Ad Hoc Networks. (2011) Megjelent: 2011 IEEE 73rd Vehicular Technology Conference pp. 1-5,
2189463
Hussain S A et al. Simulation, modeling and analysis of master node election algorithm based on signal strength for VANETs through Colored Petri nets. (2016) NEURAL COMPUTING & APPLICATIONS 0941-0643 1433-3058 2016 1-17
Lucia Gallina et al. Connectivity and energy-aware preorders for mobile ad-hoc networks. (2016) TELECOMMUNICATION SYSTEMS 1018-4864 1572-9451 63 2 307-333
Maria Michalopoulou et al. A Mean Field Analysis of CSMA/CA Throughput. (2016) IEEE TRANSACTIONS ON MOBILE COMPUTING 1536-1233 1558-0660 16 8 2093-2104
Mihai Lica. Using Symbolic Techniques and Algebraic Petri Nets to Model Check Security Protocols for Ad Hoc Networks. (2014) Megjelent: International Workshop on Petri Nets and Software Engineering (PNSE’14) p. 1
Egyéb konferenciaközlemény/Konferenciaközlemény (Egyéb konferenciaközlemény)/Tudományos[24163172] [Nyilvános]
Pura M L et al. Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies. (2014) Megjelent: Transactions on Petri Nets and Other Models of Concurrency X pp. 109-130
Bugliesi M et al. Behavioural equivalences and interference metrics for mobile ad-hoc networks. (2013) PERFORMANCE EVALUATION 0166-5316 1872-745X Available online since 2nd December 2013. p. 1
Bugliesi M. Interference-Sensitive Preorders for MANETs. (2012) Megjelent: Ninth International Conference on Quantitative Evaluation of Systems (QEST), 2012 pp. 189-198
Schaffer Péter et al. Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey. (2012) COMPUTER NETWORKS 1389-1286 56 11 2726-2741,
2182058
Elsadig M.A. et al. Security issues and challenges on wireless sensor networks. (2019) INTERNATIONAL JOURNAL OF ADVANCED TRENDS IN COMPUTER SCIENCE AND ENGINEERING 2278-3091 8 4 1551-1559
Singh S. et al. Detection techniques for selective forwarding attack in wireless sensor networks. (2019) INTERNATIONAL JOURNAL OF RECENT TECHNOLOGY AND ENGINEERING (IJRTE) 2277-3878 7 6 380-383
Priyadarshi R. et al. SEEN: Stable Energy Efficient Network for Wireless Sensor Network. (2018) Megjelent: 2018 5th International Conference on Signal Processing and Integrated Networks pp. 338-342
Cheng Z. et al. Mechanism of immune system based topology control clustering algorithm in wireless sensor networks. (2018) Megjelent: Proceedings of the 30th Chinese Control and Decision Conference, CCDC 2018 pp. 2217-2221
Wang Gicheol et al. A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey. (2018) SECURITY AND COMMUNICATION NETWORKS 1939-0114 1939-0122 2018
Ishaq Zeba et al. A Security Framework for Cluster-Based Wireless Sensor Networks against the Selfishness Problem. (2018) WIRELESS COMMUNICATIONS & MOBILE COMPUTING 1530-8669 1530-8677 2018
Chelbi Slaheddine et al. A new hybrid routing protocol for wireless sensor networks. (2018) INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING 1743-8225 28 4 247-257
Deepa C. et al. EESRP: An energy efficient, QoS aware and secure routing protocol for wireless sensor networks. (2017) CEPAL REVIEW 0251-2920 1684-0348 2017 123 2976-2989
Krishna M Bala et al. Deterministic K-means secure coverage clustering with periodic authentication for wireless sensor networks. (2017) INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 1074-5351 1099-1131 30 4
Lopez-Valcarce Roberto et al. Defending Surveillance Sensor Networks Against Data-Injection Attacks via Trusted Nodes. (2017) Megjelent: 25th European Signal Processing Conference (EUSIPCO) pp. 380-384
Lee C.-S.. Analysis of energy efficiency using improved MAC in wireless sensor network environments. (2017) INTERNATIONAL JOURNAL OF CONTROL & AUTOMATION 2005-4297 10 11 39-50
Rao K L et al. ADAPTIVE ENERGY EFFICIENT DECENTRALIZED HIERARCHICAL DYNAMIC CLUSTER BASED ROUTING PROTOCOL IN WSN. (2017) ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES 0974-6803 2197-1161 17 1 181-195
Jan M et al. PAWN: A payload-based mutual authentication scheme for wireless sensor networks. (2016) CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE 1532-0626 1532-0634 2016
Khan M Saud et al. Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks. (2016) JOURNAL OF SENSORS 1687-725X 1687-7268 2016
Chelbi S. et al. Event-driven wireless sensor networks based on consensus. (2016) Megjelent: Proceedings of 13th International Conference of Computer Systems and Applications
El Mourabit Y. et al. Efficient energy mobile agent collector for intrusion detection system in wireless sensor network. (2016) JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY 1992-8645 1817-3195 87 3 520-526
Alattas R.. Detecting black-hole attacks in WSNs using multiple base stations and check agents. (2016) Megjelent: PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC) pp. 1020-1024
Curry R M et al. A survey of optimization algorithms for wireless sensor network lifetime maximization. (2016) COMPUTERS AND INDUSTRIAL ENGINEERING 0360-8352 1879-0550 101 145-166
Nagamuthu Krishnan S et al. A QOS parameter based solution for black hole denial of service attack in wireless sensor networks. (2016) INDIAN JOURNAL OF SCIENCE AND TECHNOLOGY 0974-6846 0974-5645 9 38
Chelbi S et al. An unequal cluster-based routing protocol based on data controlling for wireless sensor network. (2016) INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING 2088-8708 6 5 2403-2414
Sabet M et al. An energy efficient multi-level route-aware clustering algorithm for wireless sensor networks: A self-organized approach. (2016) COMPUTERS & ELECTRICAL ENGINEERING 0045-7906 56 399-417
Rocha Atslands R et al. A fully-decentralized semantic mechanism for autonomous wireless sensor nodes. (2016) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 61 142-160
Arunraja Muruganantham et al. Distributed Energy Efficient Clustering Algorithm for Wireless Sensor Networks. (2015) INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS 0352-9045 45 3 180-187
Ashraf QM et al. Autonomic schemes for threat mitigation in Internet of Things. (2015) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 49 112-127
Maryam Sabet et al. A Decentralized Energy Efficient Hierarchical Cluster-based Routing Algorithm for Wireless Sensor Networks. (2015) AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS 1434-8411 69 5 790-799
Wang Gicheol et al. Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks. (2014) INTERNATIONAL JOURNAL OF COMMUNICATON NETWORKS AND INFORMATION SECURITY 2076-0930 2073-607X 6 1 70-88
Elhoseny M et al. Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks. (2014) INTERNATIONAL JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS SECURITY 2308-9830 2 11 400-413
Li X et al. Network Topology Connection Optimization Control Algorithm Based on Network Efficiency and Average Connectivity. (2014) JOURNAL OF NETWORKS 1796-2056 9 5 1252-1259
Li Hongbing et al. Mechanism of Immune System Based Clustering Topology Control Algorithm in Wireless Sensor Networks. (2014) INFORMATION TECHNOLOGY JOURNAL 1812-5638 1812-5646 13 1 p. 1
Deepa C et al. HHCS: Hybrid hierarchical cluster based secure routing protocol for Wireless Sensor Networks. (2014) Megjelent: International Conference on Information Communication and Embedded Systems (ICICES), 2014 pp. 1-6
Egyéb konferenciaközlemény/Konferenciaközlemény (Egyéb konferenciaközlemény)/Tudományos[24535866] [Nyilvános]
Kavitha G et al. Foraging optimization for cluster head selection. (2014) JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY 1992-8645 1817-3195 61 3 1-9
Rehan Shams et al. Energy Efficient Clustering Algorithms for Wireless Sensors Network: A Survey. (2014) Megjelent: International Conference on Computers and Emerging Technologies (ICCET-2014) pp. 1-7
Egyéb konferenciaközlemény/Konferenciaközlemény (Egyéb konferenciaközlemény)/Tudományos[24163052] [Nyilvános]
Shamshirband S et al. D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks. (2014) MEASUREMENT 0263-2241 1 1 1-40
Shamshirband S et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. (2014) ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE 0952-1976 1 1 p. 1
Shamshirband S et al. Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. (2014) JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 1064-1246 1875-8967 28 3 1345-1357
Shamshirband Shahaboddin et al. Co-FAIS: Cooperative Fuzzy Artificial Immune System for Detecting Intrusion in Wireless Sensor Networks. (2014) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 42 102-117
Jaspreet Kaur et al. BHDP Using Fuzzy Logic Algorithm for Wireless Sensor Network under Black Hole Attack. (2014) INTERNATIONAL JOURNAL OF ADVANCE RESEARCH IN COMPUTER SCIENCE AND MANAGEMENT STUDIES 2278-733X 2 9 142-151
S Vijiya et al. Analytical Survey on Ant and Fuzzy Clustering Based Data aggregation Techniques in Wireless Sensor Network. (2014) INTERNATIONAL JOURNAL OF SCIENTIFIC AND RESEARCH PUBLICATION 2250-3153 2250-3153 4 6 p. 1
Peyman Mirhadi et al. IP2P K-means: an efficient method for data clustering on sensor networks. (2013) MANAGEMENT SCIENCE LETTERS 1923-9335 1923-9343 2013 3 967-972
Wazid M et al. Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network. (2013) Megjelent: 2013 International Conference on Communications and Signal Processing (ICCSP)
Sadeghi Sanaz et al. Designing secure clustering protocol with the approach of reducing energy consumption in wireless sensor networks. (2013) INTERNATIONAL JOURNAL OF COMPUTER NETWORKS & COMMUNICATIONS 0975-2293 0974-9322 5 4 p. 1
Yang P et al. An iterative, cluster-based routing protocol based on energy welfare for maximizing network lifetime in Wireless Sensor Networks. (2013) Megjelent: IIE Annual Conference and Expo 2013 pp. 36-44
Shamshirband S et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. (2013) ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE 0952-1976 26 9 2105-2127
Mohammad Masdari et al. Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks. (2013) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 36 4 1243-1261
Nan Yao et al. Reliability of Wireless Sensor Network: Hotspot and critical challenges. (2012) Megjelent: 2012 10th IEEE International Conference on Industrial Informatics (INDIN) pp. 1262-1266
Egyéb konferenciaközlemény/Konferenciaközlemény (Egyéb konferenciaközlemény)/Tudományos[22886851] [Nyilvános]
Ádám Horváth. Usability of Deterministic and Stochastic Petri Nets in the Wood Industry: A Case Study. (2014) Megjelent: Advanced Computational Methods for Knowledge Engineering pp. 119-127,
2735778
Bérczes Tamás et al. A Finite-Source Queuing Model for Spectrum Renting in Mobile Cellular Networks. (2014) Megjelent: Proceedings of the 10th International Conference ELEKTRO 2014 pp. 26-30,
2599232
L Charabi et al. Call Admission Control in Small Cell Networks with Retrials and Guard Channels. (2016) Megjelent: 2016 IEEE Global Communications Conference (GLOBECOM)
Sang-Seon Byun. Optimized Spectrum Pooling by Inventory Model. (2014) Journal of the Korea Institute of Information and Communication Engineering 2234-4772 2288-4165 18 11 2664-2669
Tien Van Do et al. Modelling Opportunistic Spectrum Renting in Mobile Cellular Networks. (2015) JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1084-8045 ̃̀52 129-138,
2766329
Zaghouani Mohamed Hedi et al. Performance evaluation of finite-source Cognitive Radio Networks with impatient customers. (2020) ANNALES MATHEMATICAE ET INFORMATICAE 1787-5021 1787-6117 51 89-99
Nemouchi Hamza et al. Performance evaluation of finite-source cognitive radio networks with non-reliable services using simulation. (2018) ANNALES MATHEMATICAE ET INFORMATICAE 1787-5021 1787-6117 49 109-122