-
3
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs
-
D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor network security," Tech. Rep. 00-010, NAI Labs, 2002.
-
(2002)
Tech. Rep.
, Issue.10
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
4
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: security protocols for sensor networks," Mobile Computing and Networking, pp. 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
7
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Y. Zhang and W Lee, "Intrusion detection in wireless ad-hoc networks," Mobile Computing and Networking, pp. 275-283, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
8
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
IEEE Computer Society
-
Y. an Huang, W. Fan, W Lee, and P. S. Yu, "Cross-feature analysis for detecting ad-hoc routing anomalies," in the Proceedings of the 23rd International Conference on Distributed Computing Systems, IEEE Computer Society, 2003.
-
(2003)
The Proceedings of the 23rd International Conference on Distributed Computing Systems
-
-
Huang, Y.A.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
10
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, no. 5, pp. 545-556, 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
11
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
G. Vigna, S. Gwalani, K. Srinivasan, E. M. Belding-Royer, and R. A. Kemmerer, "An intrusion detection tool for AODV-based ad hoc wireless networks," in the Proceedings of the 20th Annual Computer Security Applications Conference, pp. 16-27, 2004.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.M.4
Kemmerer, R.A.5
-
13
-
-
1542747838
-
Detection of transient in radio frequency fingerprinting using phase characteristics of signals
-
J. Hall, M. Barbeau, and E. Kranakis, "Detection of transient in radio frequency fingerprinting using phase characteristics of signals," in the Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications (WOC), pp. 13-18, 2003.
-
(2003)
Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications (WOC)
, pp. 13-18
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
15
-
-
4344696656
-
A class A/B low power amplifier for wireless sensor networks
-
Y. Chee, J. Rabaey, and A. Niknejad, "A class A/B low power amplifier for wireless sensor networks," in the Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 4, pp. 409-412, 2004.
-
(2004)
Proceedings of the 2004 International Symposium on Circuits and Systems
, vol.4
, pp. 409-412
-
-
Chee, Y.1
Rabaey, J.2
Niknejad, A.3
|