Cited By
View all- Krentz KVoigt T(2024)Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMORComputer Communications10.1016/j.comcom.2024.01.024217:C(57-69)Online publication date: 25-Jun-2024
- Akram JJaved AKhan SAkram AMunawar HAhmad WHung CHong JBechini ASong E(2021)Swarm intelligence based localization in wireless sensor networksProceedings of the 36th Annual ACM Symposium on Applied Computing10.1145/3412841.3442062(1906-1914)Online publication date: 22-Mar-2021
- Schuß MBoano CWeber MSchulz MHollick MRömer KLiu YXing GHe YPicco G(2019)JamLab-NG: Benchmarking Low-Power Wireless Protocols under Controllable and Repeatable Wi-Fi InterferenceProceedings of the 2019 International Conference on Embedded Wireless Systems and Networks10.5555/3324320.3324331(83-94)Online publication date: 25-Feb-2019
- Show More Cited By