These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
112 related articles for article (PubMed ID: 37447791)
1. A Novel Diagnosis Scheme against Collusive False Data Injection Attack. Hu J; Yang X; Yang L Sensors (Basel); 2023 Jun; 23(13):. PubMed ID: 37447791 [TBL] [Abstract][Full Text] [Related]
2. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack. Nirmal Raja K; Maraline Beno M J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503 [TBL] [Abstract][Full Text] [Related]
3. A Security Mechanism for Cluster-Based WSN against Selective Forwarding. Zhou H; Wu Y; Feng L; Liu D Sensors (Basel); 2016 Sep; 16(9):. PubMed ID: 27657073 [TBL] [Abstract][Full Text] [Related]
4. Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination. S TS; P V PeerJ Comput Sci; 2024; 10():e2130. PubMed ID: 38983215 [TBL] [Abstract][Full Text] [Related]
5. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network. Peng Y; Choi J ScientificWorldJournal; 2014; 2014():975054. PubMed ID: 24707224 [TBL] [Abstract][Full Text] [Related]
6. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Nam J; Choo KK; Han S; Kim M; Paik J; Won D PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359 [TBL] [Abstract][Full Text] [Related]
7. Sensor data security level estimation scheme for wireless sensor networks. Ramos A; Filho RH Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215 [TBL] [Abstract][Full Text] [Related]
8. A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks. Hu J; Yang X; Yang LX Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475179 [TBL] [Abstract][Full Text] [Related]
9. Travelling Wave Pulse Coupled Oscillator (TWPCO) Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks. Al-Mekhlafi ZG; Hanapi ZM; Othman M; Zukarnain ZA PLoS One; 2017; 12(1):e0167423. PubMed ID: 28056020 [TBL] [Abstract][Full Text] [Related]
10. A lightweight data integrity scheme for sensor networks. Kamel I; Juma H Sensors (Basel); 2011; 11(4):4118-36. PubMed ID: 22163840 [TBL] [Abstract][Full Text] [Related]
11. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks. Feng J; Zhang M; Xiao Y; Yue H Sensors (Basel); 2018 Jan; 18(2):. PubMed ID: 29382061 [TBL] [Abstract][Full Text] [Related]
12. Evaluating the power consumption of wireless sensor network applications using models. Dâmaso A; Freitas D; Rosa N; Silva B; Maciel P Sensors (Basel); 2013 Mar; 13(3):3473-500. PubMed ID: 23486217 [TBL] [Abstract][Full Text] [Related]
13. On prolonging network lifetime through load-similar node deployment in wireless sensor networks. Li QQ; Gong H; Liu M; Yang M; Zheng J Sensors (Basel); 2011; 11(4):3527-44. PubMed ID: 22163809 [TBL] [Abstract][Full Text] [Related]