เจ้าของ
แบบดูได้อย่างเดียว
การอัปโหลดและแก้ไข

Security

โดย ted T. 39,101 KB • 58 ไฟล์

แจ้งการใช้ในทางที่ผิด
ดาวน์โหลดเป็น Zip
เพิ่มลงในบัญชีผู้ใช้ของฉัน
 
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks.pdf
an improved transport layer protocol for wireless sensor networks.pdf
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks.pdf
Attack_Types.pdf
computer science,robotics,artificial intelligence,neural networks,it.pdf
detecting selective forwarding attacks in wireless sensor networks.pdf
detecting sybil attacks in wireless sensor networks using neighboring information.pdf
e4019faa61ac9dfa254aef5a452a8a98.pdf
establishing pairwise keys in distributed_sensor networks_.pdf
hoca healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks.pdf
impact of denial of serviceattacks on ad hoc networks.pdf
Improving security in WMNs with reputation systems and self-organizing maps.pdf
insens intrusion-tolerant routing for wireless sensor networks.pdf
ldc_tutorial.pdf
lincrypt.pdf
LinDifAnalyse.pdf
Linear Cryptanalysis Method for DES cypher.pdf
linear_chapter.pdf
management and applications of trust in wireless sensor networks a survey.pdf
Paper_5-Detection_and_Correction_of_Sinkhole_attack_with_novel_method_in_WSN_using_NS2_tool.pdf
prezent-samed bajric.pdf
random key predistribu- tion schemes for sensor networks.pdf
secure routing in wireless sensor networks_ attacks and countermeasures.pdf
seem secure and energy-efficient multipath routing protocol for wireless sensor networks.pdf
sia- secure infor-mation aggregation in sensor networks.pdf
Trust mechanisms in wireless sensor networks Attack analysis and countermeasures.pdf
Using directional antennas to preventwormhole attacks.pdf
using learned data patterns to detect malicious nodes in sensor networks.pdf

ตรวจสอบ 28 office ไฟล์ที่แฟ้ม 4shared ของฉัน Security

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree