-
1
-
-
0142060789
-
Wireless sensor networks
-
in Chinese
-
Ren Feng-Yuan, Huang Hai-Ning, Lin Chuang. Wireless sensor networks. Journal of Software, 2003, 14(7): 1282-1291 (in Chinese)
-
(2003)
Journal of Software
, vol.14
, Issue.7
, pp. 1282-1291
-
-
Ren, F.-Y.1
Huang, H.-N.2
Lin, C.3
-
4
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
Loo C E, Ng M Y, Leckie C, Palaniswami M. Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks, 2006, 2(4): 313-332
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.4
, pp. 313-332
-
-
Loo, C.E.1
Ng, M.Y.2
Leckie, C.3
Palaniswami, M.4
-
6
-
-
3142684688
-
Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
-
Boston, USA
-
Doumit S, Agrawal D P. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks//Proceedings of the IEEE Military Communications Conference (MILCOM'03). Boston, USA, 2003, 22(1): 609-614
-
(2003)
Proceedings of the IEEE Military Communications Conference (MILCOM'03)
, vol.22
, Issue.1
, pp. 609-614
-
-
Doumit, S.1
Agrawal, D.P.2
-
7
-
-
33745969132
-
Defending against path-based DoS attacks in wireless sensor networks
-
New York, NY, USA
-
Deng J, Han R, Mishra S. Defending against path-based DoS attacks in wireless sensor networks//Proceedings of the 3rd ACM on the Security of Ad Hoc and Sensor Networks (SASN'05). New York, NY, USA, 2005: 89-96
-
(2005)
Proceedings of the 3rd ACM on the Security of Ad Hoc and Sensor Networks (SASN'05)
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
18844454790
-
Intrusion detection in sensor networks: A non-cooperative game approach
-
Cambridge, MA
-
Agah A, Das S K, Basu K, Asadi M. Intrusion detection in sensor networks: A non-cooperative game approach//Proceedings of the 3rd IEEE International Symposium on Network Computing and Application (NCA'04). Cambridge, MA, 2004: 343-346
-
(2004)
Proceedings of the 3rd IEEE International Symposium on Network Computing and Application (NCA'04)
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
9
-
-
33750599082
-
Identify abnormal packet loss in selective forwarding attacks
-
in Chinese
-
Yu Bo, Yang Min, Wang Zhi, Gao Chuan-Shan. Identify abnormal packet loss in selective forwarding attacks. Chinese Journal of Computers, 2006, 29(9): 1542-1552 (in Chinese)
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.9
, pp. 1542-1552
-
-
Yu, B.1
Yang, M.2
Wang, Z.3
Gao, C.-S.4
-
10
-
-
36248974173
-
Research on security system of wireless sensor network based on biological immunity principle
-
in Chinese
-
Zeng Peng, Liang Wei, Wang Jun, Yu Hai-Bin. Research on security system of wireless sensor network based on biological immunity principle. Mini-micro System, 2005, 26(11): 1907-1910 (in Chinese)
-
(2005)
Mini-micro System
, vol.26
, Issue.11
, pp. 1907-1910
-
-
Zeng, P.1
Liang, W.2
Wang, J.3
Yu, H.-B.4
-
11
-
-
32444446043
-
Wireless sensor networks for intrusion detection: Packet traffic modeling
-
Demirkol I, Alagoz F, Delic H, Ersoy C. Wireless sensor networks for intrusion detection: packet traffic modeling. IEEE Communications Letters, 2006, 10(1): 22-24
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.1
, pp. 22-24
-
-
Demirkol, I.1
Alagoz, F.2
Delic, H.3
Ersoy, C.4
-
12
-
-
4544291032
-
System lifetime optimization for heterogeneous sensor networks with a hub-spoke topology
-
Ma Y, Aylor J H. System lifetime optimization for heterogeneous sensor networks with a hub-spoke topology. IEEE Transactions on Mobile Computing, 2004, 3(3): 286-294
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.3
, pp. 286-294
-
-
Ma, Y.1
Aylor, J.H.2
-
13
-
-
34347241319
-
An approach for constructing load-balancing networks for data gathering wireless sensor networks
-
in Chinese
-
Zhang Chong-Qing, Li Ming-Lu, Wu Min-You. An approach for constructing load-balancing networks for data gathering wireless sensor networks. Journal of Software, 2007, 18(5): 1110-1121 (in Chinese)
-
(2007)
Journal of Software
, vol.18
, Issue.5
, pp. 1110-1121
-
-
Zhang, C.-Q.1
Li, M.-L.2
Wu, M.-Y.3
-
15
-
-
0036996049
-
ARMA-based traffic prediction and overload detection of network
-
in Chinese
-
Zou Bai-Xian, Liu Qiang. ARMA-based traffic prediction and overload detection of network. Journal of Computer Research and Development, 2002, 39(12): 1645-1652 (in Chinese)
-
(2002)
Journal of Computer Research and Development
, vol.39
, Issue.12
, pp. 1645-1652
-
-
Zou, B.-X.1
Liu, Q.2
-
16
-
-
2942656255
-
Secure routing in sensor networks: Attacks and countermeasures
-
Karlof C, Wagner D. Secure routing in sensor networks: Attacks and countermeasures. Ad Hoc Networks, 2003, 1(1): 293-315
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
17
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
Heinzelman W B, Chandrakasan A P, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. IEEE Transaction on Wireless Communications, 2002, 1(4): 660-670
-
(2002)
IEEE Transaction on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
|