Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments

31. May 2023
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments
1 von 10

Más contenido relacionado

Similar a Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments

Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enha...IJCNCJournal
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
A survey on wireless sensor networks security with the integration of cluster...A survey on wireless sensor networks security with the integration of cluster...
A survey on wireless sensor networks security with the integration of cluster...csandit

Similar a Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments(20)

Más de Venu Madhav

A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
An efficient educational data mining approach to support e-learningAn efficient educational data mining approach to support e-learning
An efficient educational data mining approach to support e-learningVenu Madhav
Ant-based distributed denial of service detection technique using roaming vir...Ant-based distributed denial of service detection technique using roaming vir...
Ant-based distributed denial of service detection technique using roaming vir...Venu Madhav
Human muscle rigidity identification by human-robot approximation characteris...Human muscle rigidity identification by human-robot approximation characteris...
Human muscle rigidity identification by human-robot approximation characteris...Venu Madhav
Attribute‑based data fusion for designing a rational trust model for improvin...Attribute‑based data fusion for designing a rational trust model for improvin...
Attribute‑based data fusion for designing a rational trust model for improvin...Venu Madhav
Optimized Energy Management Model on Data Distributing Framework of Wireless ...Optimized Energy Management Model on Data Distributing Framework of Wireless ...
Optimized Energy Management Model on Data Distributing Framework of Wireless ...Venu Madhav

Último

Generative AI for the rest of usGenerative AI for the rest of us
Generative AI for the rest of usMassimo Ferre'
NEW METHODS FOR TRIANGULATION-BASED SHAPE ACQUISITION USING LASER SCANNERS.pdfNEW METHODS FOR TRIANGULATION-BASED SHAPE ACQUISITION USING LASER SCANNERS.pdf
NEW METHODS FOR TRIANGULATION-BASED SHAPE ACQUISITION USING LASER SCANNERS.pdfTrieuDoMinh
Foamtec ProfileFoamtec Profile
Foamtec ProfileSusanHninn
Doppler-Vor-Test-Rack.pptxDoppler-Vor-Test-Rack.pptx
Doppler-Vor-Test-Rack.pptxNeometrix_Engineering_Pvt_Ltd
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfVintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfRichard Thomson
GCSJ - GDSC NCU | Session 1GCSJ - GDSC NCU | Session 1
GCSJ - GDSC NCU | Session 1Shivam254129

Data security tolerance and portable based energy-efficient framework in sensor networks for smart grid environments