Login / Signup
Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory.
Muhammad Ahmed
Xu Huang
Dharmendra Sharma
Shutao Li
Published in:
ICA3PP (2) (2012)
Keyphrases
</>
dempster shafer theory
combination rule
belief functions
wireless sensor networks
fusion algorithm
dempster shafer
energy consumption
sensor networks
internal and external
image processing
high resolution
wavelet transform
data fusion
information fusion