Cited By
View all- Xue YYang ZWu ZWang HGui G(2025)Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying ScenariosIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.351657520(781-795)Online publication date: 1-Jan-2025
- Rehman UMahmood T(2024)Prioritization of types of wireless sensor networks by applying decision-making technique based on bipolar complex fuzzy linguistic heronian mean operatorsJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-23216746:1(967-990)Online publication date: 1-Jan-2024
- Shrivastava VBhatele MWaoo A(2024)ENHANCING RELIABILITY AND EFFICIENCY OF DETECTING MALICIOUS DATA INJECTION IN WIRELESS SENSOR NETWORKS: AN IN-DEPTH ANALYSISShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i5.2024.19005:5Online publication date: 31-May-2024
- Show More Cited By