These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
14. Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks. Liu C; Li X Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32178445 [TBL] [Abstract][Full Text] [Related]
15. Using trust to secure geographic and energy aware routing against multiple attacks. Zhang G; Zhang Y; Chen Z PLoS One; 2013; 8(10):e77488. PubMed ID: 24204842 [TBL] [Abstract][Full Text] [Related]
16. Reputation-based secure sensor localization in wireless sensor networks. He J; Xu J; Zhu X; Zhang Y; Zhang T; Fu W ScientificWorldJournal; 2014; 2014():308341. PubMed ID: 24982940 [TBL] [Abstract][Full Text] [Related]
17. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge. Ding C; Yang L; Wu M Sensors (Basel); 2017 Jan; 17(1):. PubMed ID: 28098846 [TBL] [Abstract][Full Text] [Related]
18. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Teng Z; Li M; Yu L; Gu J; Li M Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139555 [TBL] [Abstract][Full Text] [Related]
19. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks. Han G; Liu L; Jiang J; Shu L; Rodrigues JJ Sensors (Basel); 2016 Feb; 16(2):229. PubMed ID: 26891300 [TBL] [Abstract][Full Text] [Related]
20. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge. Hung LX; Canh NT; Lee S; Lee YK; Lee H Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]