4.4 Article

Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

How Do You Compute the Midpoint of an Interval?

Frederic Goualard

ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE (2014)

Article Computer Science, Hardware & Architecture

Distributed Detection of Clone Attacks in Wireless Sensor Networks

Mauro Conti et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)

Article Computer Science, Artificial Intelligence

On the detection of clones in sensor networks using random key predistribution

Richard Brooks et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2007)

Article Computer Science, Hardware & Architecture

Wireless sensor networks: a survey

IF Akyildiz et al.

COMPUTER NETWORKS (2002)