-
2
-
-
18744385858
-
Jist: An efficient approach to simulation using virtual machines: Research articles
-
R. Barr, Z. J. Haas, and R. van Renesse. Jist: an efficient approach to simulation using virtual machines: Research articles. Softw. Pract. Exper., 35(6):539-576, 2005.
-
(2005)
Softw. Pract. Exper
, vol.35
, Issue.6
, pp. 539-576
-
-
Barr, R.1
Haas, Z.J.2
van Renesse, R.3
-
3
-
-
18844451023
-
Poster abstract: Btnodes - a distributed platform for sensor nodes
-
Los Angeles, California, USA, Jan, ACM Press
-
J. Beutel, O. Kasten, and M. Ringwald. Poster abstract: Btnodes - a distributed platform for sensor nodes. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pages 292-293, Los Angeles, California, USA, Jan. 2003. ACM Press, http://www.btnode.ethz.ch/.
-
(2003)
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems
, pp. 292-293
-
-
Beutel, J.1
Kasten, O.2
Ringwald, M.3
-
4
-
-
34547395740
-
-
Chipcon AS, Oslo, Norway. Single Chip Very Low Power RF Transceiver, Rev. 2.1, Apr. 2002. http://www.chipcon.com/.
-
Chipcon AS, Oslo, Norway. Single Chip Very Low Power RF Transceiver, Rev. 2.1, Apr. 2002. http://www.chipcon.com/.
-
-
-
-
5
-
-
32144435943
-
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Q2SWinet '05: Proceedings of the 1st A CM international workshop on Quality of service & security in wireless and mobile networks, pages 16-23, New York, NY, USA, 2005. ACM Press.
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Q2SWinet '05: Proceedings of the 1st A CM international workshop on Quality of service & security in wireless and mobile networks, pages 16-23, New York, NY, USA, 2005. ACM Press.
-
-
-
-
7
-
-
34547395249
-
-
P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler. Towards secure network programming and recovery in wireless sensor networks. Technical Report UCB/EECS-2005-7, Electrical Engineering and Computer Sciences University of California at Berkeley, Oct. 2005.
-
P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler. Towards secure network programming and recovery in wireless sensor networks. Technical Report UCB/EECS-2005-7, Electrical Engineering and Computer Sciences University of California at Berkeley, Oct. 2005.
-
-
-
-
8
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
New York, NY, USA, ACM Press
-
S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 66-77, New York, NY, USA, 2004. ACM Press.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
9
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado, Jan
-
C. Hartung, J. Balasalle, and R. Han. Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado, Jan. 2005.
-
(2005)
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
10
-
-
0036983409
-
A distributed monitoring mechanism for wireless sensor networks
-
New York, NY, USA, ACM Press
-
C. Hsin and M. Liu. A distributed monitoring mechanism for wireless sensor networks. In WiSE '02: Proceedings of the 3rd A CM workshop on Wireless security, pages 57-66, New York, NY, USA, 2002. ACM Press.
-
(2002)
WiSE '02: Proceedings of the 3rd A CM workshop on Wireless security
, pp. 57-66
-
-
Hsin, C.1
Liu, M.2
-
12
-
-
33751090748
-
Distributed IDSs for enhancing security in mobile wireless sensor networks
-
P. Inverardi, L. Mostarda, and A. Navarra. Distributed IDSs for enhancing security in mobile wireless sensor networks. AINA, 2:116-120, 2006.
-
(2006)
AINA
, vol.2
, pp. 116-120
-
-
Inverardi, P.1
Mostarda, L.2
Navarra, A.3
-
14
-
-
33847326821
-
Dicas: Detection, diagnosis and isolation of control attacks in sensor networks
-
00:89-100
-
I. Khalil, S. Bagchi, and C. Nina-Rotaru. Dicas: Detection, diagnosis and isolation of control attacks in sensor networks, securecomm, 00:89-100, 2005.
-
(2005)
securecomm
-
-
Khalil, I.1
Bagchi, S.2
Nina-Rotaru, C.3
-
15
-
-
4444331720
-
Security as a new dimension in embedded system design
-
New York, NY, USA, ACM Press. Moderator-Srivaths Ravi
-
P. Kocher, R. Lee, G. McGraw, and A. Raghunathan. Security as a new dimension in embedded system design. In DAC '04: Proceedings of the 41st annual conference on Design automation, pages 753-760, New York, NY, USA, 2004. ACM Press. Moderator-Srivaths Ravi.
-
(2004)
DAC '04: Proceedings of the 41st annual conference on Design automation
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
-
16
-
-
27944469190
-
Mnp: Multihop network reprogramming service for sensor networks
-
00:7-16
-
S. S. Kulkami and L. Wang. Mnp: Multihop network reprogramming service for sensor networks, icdcs, 00:7-16, 2005.
-
(2005)
icdcs
-
-
Kulkami, S.S.1
Wang, L.2
-
17
-
-
1442337671
-
Impala: A middleware system for managing autonomic, parallel sensor systems
-
T. Liu and M. Martonosi. Impala: a middleware system for managing autonomic, parallel sensor systems. SIGPLAN Not., 38(10):107-118, 2003.
-
(2003)
SIGPLAN Not
, vol.38
, Issue.10
, pp. 107-118
-
-
Liu, T.1
Martonosi, M.2
-
19
-
-
34547437214
-
-
N. B. of Standards. Security Requirements for Cryptographic Modules. National Bureau of Standards, Dec. 2002.
-
N. B. of Standards. Security Requirements for Cryptographic Modules. National Bureau of Standards, Dec. 2002.
-
-
-
-
20
-
-
85014332650
-
Security in embedded systems: Design challenges
-
461-491
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady. Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys., 3(3):461-491, 2004.
-
(2004)
Trans. on Embedded Computing Sys
, vol.3
, Issue.3
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
23
-
-
80053424324
-
Intrusion detection and failure recovery in sensor nodes
-
Tagungsband INFORMATIK 2005, Workshop Proceedings, Heidelberg, Germany, Sept, Springer-Verlag
-
H. Vogt, M. Ringwald, and M. Strasser. Intrusion detection and failure recovery in sensor nodes. In Tagungsband INFORMATIK 2005, Workshop Proceedings, LNCS, Heidelberg, Germany, Sept. 2005. Springer-Verlag.
-
(2005)
LNCS
-
-
Vogt, H.1
Ringwald, M.2
Strasser, M.3
|