Investigation of techniques for combating malicious objects in unreliable wireless sensor networks

Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research...

Full description

Saved in:
Bibliographic Details
Main Authors: Salami, Abdulazeez F., Bello-Salau, Habeeb, Hussaini, Mukhtar, Anwar, Farhat
Format: Book Chapter
Language:English
Published: IIUM Press 2011
Subjects:
Online Access:http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf
http://irep.iium.edu.my/21965/
http://rms.research.iium.edu.my/bookstore/default.aspx
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
Be the first to leave a comment!
You must be logged in first