×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [weak protocols]
A summary of gao’s review of information security (naba barkakati)
207 views
On The Intruder Detection For Sinkhole Attack In Wireless Sensor Networks
2.155 views
On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks Edith C. H. Ngai 1, Jiangchuan Liu 2, and Michael R. Lyu 1 1 Department of Computer
213 views