Academic literature on the topic 'Wireless security networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless security networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless security networks"
Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Full textSingh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.
Full textHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Full textHadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.
Full textABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Full textChen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.
Full textP.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.
Full textKumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.
Full textPrabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.
Full textDissertations / Theses on the topic "Wireless security networks"
GHUMMAN, SHAKEEL AHMAD. "Security in Wireless Mesh Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4175.
Full textJiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.
Full textBradford, Bryan L. "Wireless security within hastily formed networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FBradford.pdf.
Full textRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Full textDe, Wit Roland Duyvené. "Provisioning VolP wireless networks with security." Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.
Full textHarbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.
Full textAbuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.
Full textLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Full textSANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.
Full textFowler, James D. "Security planning for wireless networks : DoD concerns." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362720.
Full textBooks on the topic "Wireless security networks"
Khan, Shafiullah, and Al-Sakib Khan Pathan, eds. Wireless Networks and Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2.
Full textOreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.
Full textDavid, Pollino, and NetLibrary Inc, eds. Wireless security. McGraw-Hill/Osborne, 2002.
Find full textMahmoud, Mohamed M. E. A., and Xuemin Shen. Security for Multi-hop Wireless Networks. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04603-7.
Full textSchäfer, Günter. Security in Fixed and Wireless Networks. John Wiley & Sons, Ltd, 2003. http://dx.doi.org/10.1002/0470863722.
Full textAnjum, Farooq, and Petros Mouchtaris. Security for Wireless Ad Hoc Networks. John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470118474.
Full textPetros, Mouchtaris, and Wiley online library, eds. Security for wireless ad hoc networks. Wiley-Interscience, 2007.
Find full textBook chapters on the topic "Wireless security networks"
Seon Hong, Choong, Latif U. Khan, Mingzhe Chen, Dawei Chen, Walid Saad, and Zhu Han. "Security and Privacy." In Wireless Networks. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4963-9_5.
Full textHolt, Alan, and Chi-Yu Huang. "Wireless Security." In Computer Communications and Networks. Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_6.
Full textChen, Shanzhi, Jinling Hu, Li Zhao, et al. "C-V2X Security Technology." In Wireless Networks. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-5130-5_7.
Full textZhang, Peng, and Chuang Lin. "Security Threats in Network Coding." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31083-1_2.
Full textWu, Jiangxing. "Security Risks from Vulnerabilities and Backdoors." In Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29844-9_1.
Full textZhang, Kuan, and Xuemin Shen. "Security and Privacy Challenges in MHN." In Wireless Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24717-5_2.
Full textSelmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.
Full textZou, Yulong, and Jia Zhu. "Security-Reliability Tradeoff for Cooperative Relay Networks." In Wireless Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31174-6_4.
Full textLei, Wan, Anthony C. K. Soong, Liu Jianghua, et al. "5G Security System Design for All Ages." In Wireless Networks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73703-0_6.
Full textBrecht, Benedikt, and Thorsten Hehn. "A Security Credential Management System for V2X Communications." In Wireless Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94785-3_4.
Full textConference papers on the topic "Wireless security networks"
J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.
Full textVieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.
Full textPaavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.
Full textMartinovic, Ivan, Nicos Gollan, and Jens B. Schmitt. "Firewalling wireless sensor networks: Security by wireless." In 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008. http://dx.doi.org/10.1109/lcn.2008.4664279.
Full textBurgner, Daniel E., and Luay A. Wahsheh. "Security of Wireless Sensor Networks." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.62.
Full textAl-Ka'bi, Amin H. "Security in mobile wireless networks." In 2013 International Conference on Signal Processing and Communication (ICSC). IEEE, 2013. http://dx.doi.org/10.1109/icspcom.2013.6719746.
Full textJohnson, Ashley, Joseph Molloy, Jonathan Yunes, Joseph Puthuparampil, and Abdelrahman Elleithy. "Security in Wireless Sensors Networks." In 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2019. http://dx.doi.org/10.1109/lisat.2019.8817338.
Full textLarsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.
Full textKasimov, S. S., E. N. Bugibaev, and S. D. Arzikulov. "Wireless networks and information security." In 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE, 2007. http://dx.doi.org/10.1109/canet.2007.4401684.
Full textWang, Yilin, and Maosheng Qin. "Security for wireless sensor networks." In 2010 International Conference on Control, Automation and Systems (ICCAS 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccas.2010.5669748.
Full textReports on the topic "Wireless security networks"
Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.
Full textSouppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.
Full textScarfone, K. A., D. Dicoi, M. Sexton, and C. Tibbs. Guide to securing legacy IEEE 802.11 wireless networks. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-48r1.
Full textSkalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada597308.
Full text