Browsing by Subject "Different attacks"
Now showing items 1-1 of 1
-
Conference Object
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
(2011)Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...