324
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks

      Published
      research-article
        1 ,
      ScienceOpen Posters
      ScienceOpen
      Internet security
      Bookmark

            Abstract

            Content

            Author and article information

            Journal
            ScienceOpen Posters
            ScienceOpen
            25 November 2020
            Affiliations
            [1 ] Karunya Institute of Technology and Sciences, Coimbathore, India
            Author information
            https://orcid.org/0000-0002-1833-9788
            Article
            10.14293/S2199-1006.1.SOR-.PPZFBUI.v1
            4c746cca-24bc-4fb5-b9a6-cafc60745ce1

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 25 November 2020

            The data that support the findings of this study are available from https://www.sciencedirect.com/science/article/pii/S0263224120308113 but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of https://www.sciencedirect.com/science/article/pii/S0263224120308113.
            Computer science,Engineering
            Internet security

            Comments

            Comment on this article