Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf http://irep.iium.edu.my/21965/ http://rms.research.iium.edu.my/bookstore/default.aspx |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
Be the first to leave a comment!