咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 2 篇 sensor
  • 2 篇 networks
  • 2 篇 node
  • 2 篇 wireless
  • 1 篇 genetic
  • 1 篇 message
  • 1 篇 capture
  • 1 篇 coverage
  • 1 篇 code
  • 1 篇 deployment
  • 1 篇 authentication
  • 1 篇 target
  • 1 篇 attack
  • 1 篇 security
  • 1 篇 algorithm
  • 1 篇 cryptographic

机构

  • 2 篇 department of co...
  • 2 篇 department of ne...

作者

  • 3 篇 moad mowafi
  • 3 篇 walid aljoby
  • 2 篇 lo'ai tawalbeh
  • 2 篇 mohammad al-rous...
  • 1 篇 omar banimelhem

语言

  • 3 篇 英文
检索条件"作者=walid Aljoby"
3 条 记 录,以下是1-10 订阅
排序:
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks
收藏 引用
Communications and Network 2013年 第4期5卷 273-279页
作者: Omar Banimelhem Moad Mowafi walid aljoby Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
收藏 引用
Journal of Information Security 2012年 第4期3卷 272-280页
作者: Moad Mowafi Lo'ai Tawalbeh walid aljoby Mohammad Al-Rousan Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is sus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
收藏 引用
Journal of Information Security(信息安全) 2012年 第4期
作者: Moad Mowafi Lo'ai Tawalbeh walid aljoby Mohammad Al-Rousan
来源: 评论