[1] C. Y. Chong, S. Kumar, Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE, 91(8), (2003), 1247-1256.
[2] C. Savarese, J. Rabay, Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks, General Track of the annual conference on USENIX Annual Technical Conference, (2002), 317-327.
[3] A. Savvides, C. C. Han, M. Srivastava, Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors, 7th annual international conference on Mobile computing and networking, (2001), 166-179.
[4] D. Niculescu, B. Nath, Ad Hoc Positioning System (APS), Global Telecommunications Conference, (2001), 2926-2931.
[5] S. Capkun, M. Cagalj, M. Srivastava, Securing Localization with Hidden and Mobile Base Stations, 25th IEEE Conference on Computer Communications, (2006), 1-10.
[6] S. Capkun, K. Rasmussen, M. Cagalj, M. Srivastava, Secure Location Verification with Hidden and Mobile Base Stations, IEEE Transactions on Mobile Computing, 7(4), (2008), 470-483.
[7] T. He, C. Huang, B. M. Blum, J. A. Stankovic, T. Abdelzaher, Range-Free Localization Schemes for Large Scale Sensor Networks, 9th Annual International Conference on Mobile Computing and Networking, (2003), 81-95.
[8] L. Lazos, R. Poovendran, SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks, 3rd ACM workshop on Wireless security, (2004), 21-30.
CUJSE 14, No. 1 (2017) 123
[9] Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, 4th international symposium on Information processing in sensor networks, (2005), 1-8.
[10] Y. Zhang, W. Liu, Y. Fang, D. Wu, Secure Localization and Authentication in Ultra-Wideband Sensor Networks, IEEE Journal on Selected Areas in Communications, 24(4), (2006), 829-835.
[11] Y. Zhang, W. Liu, W. Lou, Y. Fang, Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks, IEEE Journal on Selected Areas in Communications, 24(2), (2006), 247-260.
[12] R. Garg, A. Varna, M. Wu, An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security, 7(2), (2012), 717-730.
[13] Y. Zeng, J. Cao, J. Hong, S. Zhang, L. Xie, Secure Localization and Location Verification in Wireless Sensor Networks: A Survey, The Journal of Supercomputing, 64(3), (2010), 685-701.
[14] G. Han, J. Jiang, L. Shu, M. Guizani, S. Nishio, A Two-Step Secure Localization for Wireless Sensor Networks, The Computer Journal, 56(10), (2012), 1154-1166.
[15] H. Chen, W. Lou, Z. Wang, J. Wu, Z. Wang, A. Xia, Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks, Pervasive and Mobile Computing, 16(1), (2015), 22-35.
[16] D. Tran, T. Nguyen, Localization in Wireless Sensor Networks Based on Support Vector Machines, IEEE Transactions on Parallel and Distributed Systems, 19(7), (2008), 981-994.
[17] A. Chatterjee, A Fletcher-Reeves Conjugate Gradient Neural-Network-Based Localization Algorithm for Wireless Sensor Networks, IEEE Transactions on Vehicular Technology, 59(2), (2010), 823-830.
[18] C. Wang, J. Chen, Y. Sun, Sensor Network Localization Using Kernel Spectral Regression, Wireless Communications and Mobile Computing, 10(8), (2009), 1045-1054.
[19] V. Chaurasiya, N. Jain, G. Nandi, A Novel Distance Estimation Approach for 3D Localization in Wireless Sensor Network Using Multi Dimensional Scaling, Information Fusion, 15(1), (2014), 5-18.
[20] S. Afzal, H. Beigy, A Localization Algorithm for Large Scale Mobile Wireless Sensor Networks: A Learning Approach, The Journal of Supercomputing, 69(1), (2014), 98-120.
[21] J. Chen, C. Wang, Y. Sun, X. Shen, Semi-supervised Laplacian Regularized Least Squares Algorithm for Localization in Wireless Sensor Networks, Computer Networks, 55(10), (2011), 2481-2491.
[22] J. Lee, B. Choi, E. Kim, Novel Range-Free Localization Based on Multidimensional Support Vector Regression Trained in the Primal Space, IEEE Transactions on Neural Networks and Learning Systems, 24(7), (2013), 1099-1113.
[23] V. S. Feng, T. C. Wang, S. Y. Chang, H. P. Ma, Location Estimation in Indoor Wireless Networks by Hierarchical Support Vector Machines with Fast Learning Algorithm, International Conference on System Science and Engineering, (2010), 321-326.
124 S.S. Banihashemian et al.
[24] S. Yun, J. Lee, W. Chung, E. Kim, S. Kim, A Soft Computing Approach to Localization in Wireless Sensor Networks, Expert Systems with Applications, 36(4), (2009), 7552-7561.
[25] A. Velimirovic, G. Djordjevic, M. Velimirovic, M. Jovanovic, Fuzzy Ring-Overlapping Range-Free (FRORF) Localization Method for Wireless Sensor Networks, Computer Communications, 35(13), (2012), 1590-1600.
[26] A. Boukerche, H. Oliveira, E. Nakamura , A. Loureiro, Secure Localization Algorithms for Wireless Sensor Networks, IEEE Communications Magazine, 46(4), (2008), 96-101.
[27] M. M. Hamed, M.G Khalafallah, E.A. Hassanien, Prediction of Wastewater Treatment Plant Performance using Artificial Neural Networks, Environmental Modelling & Software, 19(10), (2004), 919-928.
[28] W. S. Sarle, Neural Network FAQ, Part 1 of 7: Introduction, Periodic Posting to the Usenet Newsgroup Comp. Ai. Neural-Nets. (2002), URL: ftp://ftp.sas.com/pub/neural/FAQ.html.
Thank you for copying data from http://www.arastirmax.com