Browsing by Subject "Security evaluation"
Now showing items 1-1 of 1
-
Conference Object
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks
(2012)Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks ...