Login / Signup
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
Mohsen Rezvani
Aleksandar Ignjatovic
Elisa Bertino
Sanjay K. Jha
Published in:
SenSys (2013)
Keyphrases
</>
malicious attacks
wireless sensor networks
information systems
energy consumption
sensor nodes
resource constrained
database
real time
sensor networks
routing algorithm
energy efficient
parameter tuning
filtering method