-
1
-
-
32144460581
-
-
http://www.tinyos.net/.
-
-
-
-
6
-
-
0033293621
-
A large scale distributed intrusion detection framework based on attack strategy analysis
-
M.-Y. HUANG, R. J. JASPER, AND T. M. WICKS, A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks, 31 (1999), pp. 2465-2475.
-
(1999)
Computer Networks
, vol.31
, pp. 2465-2475
-
-
Huang, M.-Y.1
Jasper, R.J.2
Wicks, T.M.3
-
8
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. ILGUN. R. A. KEMMERER, AND P. PORRAS, State transition analysis: A rule-based intrusion detection approach, IEEE Trans on Software Engineering, 21 (1995), pp. 181-199.
-
(1995)
IEEE Trans on Software Engineering
, vol.21
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.3
-
11
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, M. RUSCHITZKA, AND K. LEVITT, Execution monitoring of security-critical programs in distributed systems: a specification-based approach, in Proc of the 1997 IEEE Symp on Security and Privacy, 1997, p. 175.
-
(1997)
Proc of the 1997 IEEE Symp on Security and Privacy
, pp. 175
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
13
-
-
18844399081
-
Tossim: Accurate and scalable simulation of entire tinyos applications
-
P. LEVIS, N. LEE, M. WELSH, AND D. CULLER, Tossim: Accurate and scalable simulation of entire tinyos applications, in Proc of the 1st Int'l Conf on Embedded Networked Sensor Systems, 2003, pp. 126-137.
-
(2003)
Proc of the 1st Int'l Conf on Embedded Networked Sensor Systems
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
14
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. MARTI, T. J. GIULI, K. LAI. AND M. BAKER, Mitigating routing misbehavior in mobile ad hoc networks, in Mobile Computing and Networking, 2000, pp. 255-265.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
15
-
-
32144453754
-
An IDS simulator for wireless sensor networks
-
Comp Sci Dept, Federal University of Minas Gerais, May
-
M. H. T. MARTINS, A. P. R. DA SILVA, A. A. F. LOUREIRO, AND L. B. RUIZ, An IDS simulator for wireless sensor networks. Sensornet Technical Report, Comp Sci Dept, Federal University of Minas Gerais, May 2005.
-
(2005)
Sensornet Technical Report
-
-
Martins, M.H.T.1
Da Silva, A.P.R.2
Loureiro, A.A.F.3
Ruiz, L.B.4
-
16
-
-
0034593011
-
Sensorsim: A simulation framework for sensor networks
-
S. PARK, A. SAVVIDES, AND M. B. SRIVASTAVA, Sensorsim: A simulation framework for sensor networks, in Proc of the 3rd ACM Int'l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2000, pp. 104-111.
-
(2000)
Proc of the 3rd ACM Int'l Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
, pp. 104-111
-
-
Park, S.1
Savvides, A.2
Srivastava, M.B.3
-
17
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
USENIX-Security
-
V. PAXON, Bro: A system for detecting network intruders in real-time, in Proc of USENIX, USENIX-Security, 1998.
-
(1998)
Proc of USENIX
-
-
Paxon, V.1
-
18
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. PERRIG, R. SZEWCZYK, J. D. TYGAR, V. WEN, AND D. E. CULLER, Spins: Security protocols for sensor networks, Wireless Network Journal, 8 (2002), pp. 521-534.
-
(2002)
Wireless Network Journal
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
19
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
W. R. PIRES, T. H. P. FIGUEIREDO, H. C. WONG, AND A. A. F. LOUREIRO, Malicious node detection in wireless sensor networks, in 18th Int'l Parallel and Distributed Processing Symp, 2004.
-
(2004)
18th Int'l Parallel and Distributed Processing Symp
-
-
Pires, W.R.1
Figueiredo, T.H.P.2
Wong, H.C.3
Loureiro, A.A.F.4
-
21
-
-
0037319709
-
Manna: A management architecture for wireless sensor networks
-
L. B. RUIZ, J. M. S. NOGUEIRA, AND A. A. LOUREIRO, Manna: A management architecture for wireless sensor networks, IEEE Comm Magazine, 41 (2003), pp. 116-125.
-
(2003)
IEEE Comm Magazine
, vol.41
, pp. 116-125
-
-
Ruiz, L.B.1
Nogueira, J.M.S.2
Loureiro, A.A.3
-
22
-
-
0020497960
-
Distributed network protocols
-
A. SEGALL, Distributed network protocols, IEEE Trans on Info Theory, 29 (1983), pp. 23-35.
-
(1983)
IEEE Trans on Info Theory
, vol.29
, pp. 23-35
-
-
Segall, A.1
-
23
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
V. SHNAYDER, M. HEMPSTEAD, B. RONG CHEN, G. W. ALLEN, AND M. WELSH, Simulating the power consumption of large-scale sensor network applications, in Proc of the 2nd Int'l Conf on Embedded Networked Sensor Systems, 2004, pp. 188-200.
-
(2004)
Proc of the 2nd Int'l Conf on Embedded Networked Sensor Systems
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Rong Chen, B.3
Allen, G.W.4
Welsh, M.5
-
24
-
-
4544342574
-
A specification-based intrusion detection system for aodv
-
C.-Y. TSENG, P. BALASUBRAMANYAM, C. Ko, R. LIMPRASITTIPORN, J. ROWE, AND K. LEVITT, A specification-based intrusion detection system for aodv, in Proc of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 125-134.
-
(2003)
Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
25
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. WOOD AND J. A. STANKOVIC, Denial of service in sensor networks, IEEE Computer, 35 (2002), pp. 54-62.
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|