ArticleA Trust-Management-Based Intrusion Detection System for Routing Protocol Attacks in Internet of Things
ArticleA Trust-Management-Based Intrusion Detection System for Routing Protocol Attacks in Internet of Things
ArticlePerformance Analysis of Self-Healing Cluster Controlled Mobility Scheme for Data Security in UWSNs based on Proactive and Reactive Peers
ArticlePerformance Analysis of Self-Healing Cluster Controlled Mobility Scheme for Data Security in UWSNs based on Proactive and Reactive Peers