Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in wasns,” in Proc. IEEE INFOCOM, Turin, IT, Apr. 14-19 2015, pp. 2436–2444. [2] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,” IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2013. [3] Christo Ananth, A.NasrinBanu, M.Manju, S.Nilofer, S.Mageshwari, A.PeratchiSelvi, “Efficient Energy Management Routing in WSN”, International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE), Volume 1, Issue 1, August 2012,pp:16-19 [4] Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,” Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2011. [5] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen-sor networks using randomized dispersive routes,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941–954, Jul. 2010. [6] Uma Vasala and Dr. G. R. Sakthidharan,” Effective Key Management In Dynamic Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.4, no.7, pp. 308-312, 2017. [7] K.MANIMALA and .RANJITH,” Mobile Transmission Using Rigorous Data for Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 436-446, 2014. [8] P. G. V. SURESH KUMAR1 , SEELAM SOWJANYA,” Developing An Enterprise Environment by Using Wireless Sensor Network System Architecture”..”International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 902-908, 2015. [9] JALAGAM NAGAMANI, K.SUMALATHA,” EAACK: Secure IDS for Wireless Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 461-469, 2014. [10] G V N LAKSHMI PRIYANKA, TELUGU KAVITHA, B SWATHI and P.SUMAN PRAKASH,” Significance of DSSD towards Cut Detection in Wireless Sensor Network”..”International Journal of Computer Engineering in Research Trends., vol.2, no.1, pp. 8-12, 2015. [11] Kumara Swamy,E Ramya,” A Contemplate on Vampire Attacks in Wireless Ad-Hoc Sensor Networks”..”International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 834-836, 2015. [12] Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil,” Prevention of Packet Hiding Methods In Selective Jamming Attack”..”International Journal of Computer Engineering in Research Trends., vol.3, no.4, pp. 194-196, 2016.
![]() | V4I1007.pdf |