Статті в журналах з теми "Wireless security networks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Wireless security networks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Повний текст джерелаSingh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.
Повний текст джерелаHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Повний текст джерелаHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Повний текст джерелаABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Повний текст джерелаChen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.
Повний текст джерелаP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Повний текст джерелаP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Повний текст джерелаKumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.
Повний текст джерелаPrabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.
Повний текст джерелаGao, Feng, and Zhi Hua Hu. "The Security Mechanism for Wireless Sensor Networks." Applied Mechanics and Materials 256-259 (December 2012): 2392–95. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2392.
Повний текст джерелаKhalil Aljwari, Fatimah, Hajer Abdullah Alwadei, and Aseel Abdullah Alfaidi. "Security in Wireless Sensor Networks: Comparative Study." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 55–65. http://dx.doi.org/10.5121/ijcsit.2022.14305.
Повний текст джерелаPradeep and Manjunath. "A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM." International Journal of Research -GRANTHAALAYAH 6, no. 5 (May 31, 2018): 369–76. http://dx.doi.org/10.29121/granthaalayah.v6.i5.2018.1464.
Повний текст джерелаK B, Vikhyath, and Dr Brahmanand S. H. "Wireless sensor networks security issues and challenges: A survey." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 89. http://dx.doi.org/10.14419/ijet.v7i2.33.13861.
Повний текст джерелаWang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.
Повний текст джерелаKarpenko, Andrii, Tetiana Bondarenko, Viacheslav Ovsiannikov, and Valerii Martyniuk. "ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 54–66. http://dx.doi.org/10.28925/2663-4023.2020.10.5466.
Повний текст джерелаTiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.
Повний текст джерелаKalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.
Повний текст джерелаXia, Zhengxin, Zhe Wei, and Huan Zhang. "Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–9. http://dx.doi.org/10.1155/2022/3449428.
Повний текст джерелаAranzazu Suescún, Catalina. "Security in Wireless Sensor Networks." Sistemas y Telemática 7, no. 13 (August 18, 2009): 43. http://dx.doi.org/10.18046/syt.v7i13.1006.
Повний текст джерелаQian, Yi. "Security and Wireless Communication Networks." IEEE Wireless Communications 27, no. 3 (June 2020): 4–5. http://dx.doi.org/10.1109/mwc.2020.9116078.
Повний текст джерелаXiaojiang Du and Hsiao-Hwa Chen. "Security in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (August 2008): 60–66. http://dx.doi.org/10.1109/mwc.2008.4599222.
Повний текст джерелаKrishnamurthy, P., J. Kabara, and T. Anusas-Amornkul. "Security in wireless residential networks." IEEE Transactions on Consumer Electronics 48, no. 1 (February 2002): 157–66. http://dx.doi.org/10.1109/tce.2002.1010106.
Повний текст джерелаS, Sabeena, and Iniya R. "Security in wireless sensor networks." International Journal of Computer Trends and Technology 68, no. 1 (January 25, 2020): 26–30. http://dx.doi.org/10.14445/22312803/ijctt-v68i1p106.
Повний текст джерелаPerrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (June 2004): 53–57. http://dx.doi.org/10.1145/990680.990707.
Повний текст джерелаAlbermany, Salah A., and Ghazanfar A. Safdar. "Keyless Security in Wireless Networks." Wireless Personal Communications 79, no. 3 (July 25, 2014): 1713–31. http://dx.doi.org/10.1007/s11277-014-1954-1.
Повний текст джерелаGiruka, Venkata C., Mukesh Singhal, James Royalty, and Srilekha Varanasi. "Security in wireless sensor networks." Wireless Communications and Mobile Computing 8, no. 1 (2007): 1–24. http://dx.doi.org/10.1002/wcm.422.
Повний текст джерелаObaidat, Mohammed S., Petros Nicopolitidis, and Jung-Shian Li. "Security in wireless sensor networks." Security and Communication Networks 2, no. 2 (December 30, 2008): 101–3. http://dx.doi.org/10.1002/sec.92.
Повний текст джерелаDidmanidze, Ibraim, Zebur Beridze, and Vladimir Zaslavski. "Analysis of wireless network security systems problems and those solutions." Modeling, Control and Information Technologies, no. 4 (October 23, 2020): 139–40. http://dx.doi.org/10.31713/mcit.2020.31.
Повний текст джерелаRehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, and Nida Aslam. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (August 12, 2022): 2529. http://dx.doi.org/10.3390/electronics11162529.
Повний текст джерелаWang, Hao, and Jin Tao Shi. "Safety Protection Technology in the Application of the Wireless Network." Applied Mechanics and Materials 685 (October 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.685.591.
Повний текст джерелаGuyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.
Повний текст джерелаZou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.
Повний текст джерелаDivya, K., and B. Srinivasan. "Review on Security in Wireless Sensor Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 63–66. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1956.
Повний текст джерелаSetyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.
Повний текст джерелаRana, Muhammad Ehsan. "Common Security Protocols for Wireless Networks: A Comparative Analysis." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 3887–96. http://dx.doi.org/10.37200/ijpr/v24i5/pr202097.
Повний текст джерелаLi, Yuanming, Wei Guo, Xuejun Meng, and Wen Xia. "Charging wireless sensor network security technology based on encryption algorithms and dynamic model." International Journal of Distributed Sensor Networks 16, no. 3 (February 29, 2020): 155014772090199. http://dx.doi.org/10.1177/1550147720901999.
Повний текст джерелаYuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.
Повний текст джерелаRath, Mamata, Bibudhendu Pati, and Binod Kumar Pattanayak. "Manifold Surveillance Issues in Wireless Network and the Secured Protocol." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 16–26. http://dx.doi.org/10.4018/ijisp.2020010102.
Повний текст джерелаKar, Dulal C., Hung L. Ngo, and Geetha Sanapala. "Applied Cryptography for Security and Privacy in Wireless Sensor Networks." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 14–36. http://dx.doi.org/10.4018/jisp.2009100702.
Повний текст джерелаZeng, Tao. "Routing Protocol Security Strategies of Non-Uniform Energy Distribution Wireless Network." Applied Mechanics and Materials 536-537 (April 2014): 715–18. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.715.
Повний текст джерелаShen, Xuemin (Sherman), Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendoerfer, and Zhenfu Cao. "Wireless network security." Wireless Communications and Mobile Computing 6, no. 3 (2006): 269–71. http://dx.doi.org/10.1002/wcm.393.
Повний текст джерелаZhao, Ke, Long Fei Xiao, Ya Long Hu, and Zhong Wang. "Based on the Research of WSN in Information Security Technology." Applied Mechanics and Materials 556-562 (May 2014): 5976–78. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5976.
Повний текст джерелаWei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Повний текст джерелаFirmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.
Повний текст джерелаFirmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.
Повний текст джерелаYang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.
Повний текст джерелаItani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (April 2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.
Повний текст джерелаRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Повний текст джерелаProdanovic, Radomir, and Dejan Simic. "Holistic approach to Wep protocol in securing wireless network infrastructure." Computer Science and Information Systems 3, no. 2 (2006): 97–113. http://dx.doi.org/10.2298/csis0602097p.
Повний текст джерела