Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “ERCD: An energy-efficient clone detection protocol in wasns,†in Proc. IEEE INFOCOM, Turin, IT, Apr. 14-19 2015, pp. 2436–2444. [2] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of emerging machine to machine communications,†IEEE Communications Magazine, vol. 49, no. 4, pp. 28–35, Apr. 2013. [3] Christo Ananth, A.NasrinBanu, M.Manju, S.Nilofer, S.Mageshwari, A.PeratchiSelvi, “Efficient Energy Management Routing in WSNâ€, International Journal of Advanced Research in Management, Architecture, Technology and Engineering (IJARMATE), Volume 1, Issue 1, August 2012,pp:16-19 [4] Liu, J. Ren, X. Li, Z. Chen, and X. Shen, “Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks,†Computer Networks, vol. 56, no. 7, pp. 1951–1967, May. 2011. [5] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sen-sor networks using randomized dispersive routes,†IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941–954, Jul. 2010. [6] Uma Vasala and Dr. G. R. Sakthidharan,†Effective Key Management In Dynamic Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.4, no.7, pp. 308-312, 2017. [7] K.MANIMALA and .RANJITH,†Mobile Transmission Using Rigorous Data for Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 436-446, 2014. [8] P. G. V. SURESH KUMAR1 , SEELAM SOWJANYA,†Developing An Enterprise Environment by Using Wireless Sensor Network System Architectureâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.10, pp. 902-908, 2015. [9] JALAGAM NAGAMANI, K.SUMALATHA,†EAACK: Secure IDS for Wireless Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.1, no.6, pp. 461-469, 2014. [10] G V N LAKSHMI PRIYANKA, TELUGU KAVITHA, B SWATHI and P.SUMAN PRAKASH,†Significance of DSSD towards Cut Detection in Wireless Sensor Networkâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.1, pp. 8-12, 2015. [11] Kumara Swamy,E Ramya,†A Contemplate on Vampire Attacks in Wireless Ad-Hoc Sensor Networksâ€..â€International Journal of Computer Engineering in Research Trends., vol.2, no.12, pp. 834-836, 2015. [12] Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil,†Prevention of Packet Hiding Methods In Selective Jamming Attackâ€..â€International Journal of Computer Engineering in Research Trends., vol.3, no.4, pp. 194-196, 2016.
![]() | V4I1007.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|