Article spécial
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
Provably Secure Routing and Defending Against Vampire Attacks in Wireless Ad Hoc Sensor Networks
Critical Analysis and Detection of Altered Fingerprints
Identification of Malicious Node by Using Mamdani Method in CRN
Implementation of Quality Function Deployment in Pump Industry
Security Monitoring Using Embedded Systems
Voir plus