These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
234 related articles for article (PubMed ID: 27367700)
21. A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks. Yang J; He S; Xu Y; Chen L; Ren J Sensors (Basel); 2019 Feb; 19(4):. PubMed ID: 30823560 [TBL] [Abstract][Full Text] [Related]
22. A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs. Liu A; Liu X; Long J Sensors (Basel); 2016 Mar; 16(4):451. PubMed ID: 27043566 [TBL] [Abstract][Full Text] [Related]
23. Game-theoretic approach for improving cooperation in wireless multihop networks. Ng SK; Seah WK IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):559-74. PubMed ID: 20211801 [TBL] [Abstract][Full Text] [Related]
24. Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks. Alshinina R; Elleithy K Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28282896 [TBL] [Abstract][Full Text] [Related]
25. Attack Classification Schema for Smart City WSNs. Garcia-Font V; Garrigues C; Rifà-Pous H Sensors (Basel); 2017 Apr; 17(4):. PubMed ID: 28379192 [TBL] [Abstract][Full Text] [Related]
26. Attack and flee: game-theory-based analysis on interactions among nodes in MANETs. Li F; Yang Y; Wu J IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):612-22. PubMed ID: 20031501 [TBL] [Abstract][Full Text] [Related]
27. Dynamic reconfiguration of security policies in wireless sensor networks. Pinto M; Gámez N; Fuentes L; Amor M; Horcas JM; Ayala I Sensors (Basel); 2015 Mar; 15(3):5251-80. PubMed ID: 25746093 [TBL] [Abstract][Full Text] [Related]
28. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge. Ding C; Yang L; Wu M Sensors (Basel); 2017 Jan; 17(1):. PubMed ID: 28098846 [TBL] [Abstract][Full Text] [Related]
29. Defending Against Advanced Persistent Threats Using Game-Theory. Rass S; König S; Schauer S PLoS One; 2017; 12(1):e0168675. PubMed ID: 28045922 [TBL] [Abstract][Full Text] [Related]
30. Dynamic Bargain Game Theory in the Internet of Things for Data Trustworthiness. Sumathi AC; Akila M; Pérez de Prado R; Wozniak M; Divakarachari PB Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833686 [TBL] [Abstract][Full Text] [Related]
31. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Teng Z; Li M; Yu L; Gu J; Li M Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139555 [TBL] [Abstract][Full Text] [Related]
32. An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks. Khan MA; Nasralla MM; Umar MM; Ghani-Ur-Rehman ; Khan S; Choudhury N Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062372 [TBL] [Abstract][Full Text] [Related]
33. Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks. Yi C; Yang G; Dai H; Liu L; Li N Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30413068 [TBL] [Abstract][Full Text] [Related]
34. Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack-Defense Game Model. Liu G; Peng B; Zhong X Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33467692 [TBL] [Abstract][Full Text] [Related]
35. Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks. Yang G; Dai L; Wei Z Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30428536 [TBL] [Abstract][Full Text] [Related]
36. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions. Muhammed D; Anisi MH; Zareei M; Vargas-Rosales C; Khan A Sensors (Basel); 2018 Feb; 18(2):. PubMed ID: 29389874 [TBL] [Abstract][Full Text] [Related]
37. A Game Model for Analyzing Wireless Sensor Networks of 5G Environment Based on Adaptive Equilibrium Optimizer Algorithm. Zheng W; Meng F; Liu N; Huang S Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836885 [TBL] [Abstract][Full Text] [Related]
38. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model. Meng T; Li X; Zhang S; Zhao Y Sensors (Basel); 2016 Sep; 16(10):. PubMed ID: 27690042 [TBL] [Abstract][Full Text] [Related]
39. Sensor data security level estimation scheme for wireless sensor networks. Ramos A; Filho RH Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215 [TBL] [Abstract][Full Text] [Related]
40. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks. Osanaiye O; Alfa AS; Hancke GP Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29794994 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]