Login / Signup
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm.
Jungwon Kim
Peter J. Bentley
Christian Wallenta
Mohamed Ahmed
Stephen Hailes
Published in:
ICARIS (2006)
Keyphrases
</>
sensor networks
wireless sensor networks
sensor data
data structure
energy consumption
communication cost
resource constrained
software engineering
response time
routing protocol
energy efficient
mobile sensor networks