لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Routing in S ensorNetwors : Attacks and C ountermeasue _ ...
Jason Pontin: "ETC: Bill Joy's Six Webs". In: MI TTechnology ...
Shen, Guicheng, and Bingwu Liu. "The vi sions, technolo gies, ...
Akyildiz, I.F. ; Georgia Inst. of Technol., Atlanta, GA, USA ...
Z.G. Prodanoff, Optimal frame size analysis for framedslotted ALOHA based ...
Dey, Sandipan, Ajith Abraham, and SugataSanyal. "An LSB Data Hiding ...
Rolf Clauberg. RFD and Sensor Networks: FromS ensor/Actuator to Business ...
Aashima Singla, Ratika Sachdeva, "Review onSecurity Issues and Attacks in ...
Sen, Jaydip. "Security and privacy challenges incognitive wireless sensor networks." ...
G. Bianchi, _ comparative study of the varioussecurity approaches used ...
networks, ; International Journal of Advanced Science a ndTechnology, vol. ...
T. A. Zia, _ Security Framework for Wireless S ensorNetworks ...
Bhattasali, Tapalina, RituparnaC haki, and SugataSanyal. "Sleep Deprivation Attack Detection ...
Xiangqian Chen, Kia Makki, Kang Yen, NikiPissinou, "Sensor network security: ...
Roy, Bibhash, SumanBanik, ParthiDey, Sugata Sanyaland NabenduChaki, "Ant colony based ...
M. Saxena, "Security in Wireless Sensor Networks -ALayer based classification?, ...
J. Sen, _ Survey on Wireless Sensor networkS ecurity _ ...
M. Sharifhejad, M. Shari, M. Ghiasabadi and S.Beheshti, _ Survey ...
B. T. Wang and H. Schulzrinne, _ IP trac ebackmecham ...
Canadian Conference on Electrical and Computer Engineering, vol. 2, (2004) ...
VipulGoyal, Virendra Kumar, Mayank Singh, AjithAbraham and SugataSanyal: A New ...
http : //sensors -and-networs .blogspot.in/20 1 _ /0 8 /phys ...
Ahmad Abe dAlhamee dAlkhatib, and Gurvinder SinghBaicher. "Wireless sensor networkarchie ...
Al-Sakib Khan Pathan, "Denial of Service in WirelessSensr Networks: Issues ...
Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta, Ne haGarg, "Analysis ...
Khoo, Benjamin. _ as an enabler of the internet ofthings: ...
VipulGoyal, Ajith Abraham, SugataSanyal and SangYong Han, "The N/R One ...
Informati onTechnology : Coding and Computing (ITCC05), USA, April, 2005. ...
Burmester, Mike, and Breno De Medeiros. "RFIDsecurity: attacks, c ountermeasures ...
Zhou, Wei, and Selwyn Piramuthu. _ S ecurity/pri vacyo f ...
devices." In forma tionSystems and Technologies (CISTI), 2014 9th lberian ...
Aggarwal, Charu C., and TarekAbde lzaher. "Integrating sensors and social ...
VipulGoyal, Virendra Kumar, Mayank Singh, AjithAbraham and SugataSanyal, CompChall: AddressingPas ...
Internatio nalConference _ Information Technology: Coding andComputing (ITCC'05), USA. April ...
W. Drira, Renault, E., Zeghlache, D.، Towards aSecure Social Sensor ...
N. Eagle, Pentland, A, and Lazer, D. "Inferring SocialNetwork Structure ...
M. Rahman, Carbunar, B., Banik, M. 2013. «Fit andVulnerable Attacks ...
Animesh Kr Trivedi, Rishi Kapoor, RajanArora, SudipSanyal and SugataSanyal, "RISM ...
Xiao, Qinghan, Thomas Gibbons, and Herve Lebrun."RFI Technology, Security Vulnerabilities, ...
G. Padmavathi, and D. S hanmugapriya. "A survey ofattacks, security ...
نمایش کامل مراجع