Login / Signup
Securing Personal Network clusters.
Assed Jehangir
Sonia M. Heemstra de Groot
Published in:
SecureComm (2007)
Keyphrases
</>
network structure
wireless sensor networks
network model
clustering algorithm
peer to peer
computer networks
self organizing maps
distributed network
individual user
fuzzy c means
complex networks
end to end
data sets
response time
bayesian networks
website
genetic algorithm