Browsing by Subject "Security context"
Now showing items 1-1 of 1
-
Conference Object
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks
(2012)Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks ...