-
1
-
-
0034547115
-
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
-
Aug
-
th ACM MobiCom, Aug 2000, pp. 243-254.
-
(2000)
th ACM MobiCom
, pp. 243-254
-
-
Kaip, B.1
Kung, H.T.2
-
2
-
-
85141900323
-
-
st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp.1-15.
-
st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp.1-15.
-
-
-
-
3
-
-
11144340927
-
Designing Secure Sensor Networks
-
Dec
-
E. Shi and A. Perrig, "Designing Secure Sensor Networks," IEEE Wireless Communications, vol. 11, no. 6, Dec 2004, pp. 38-43.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
7
-
-
0348195762
-
JAM: A Jammed-Area Mapping Service for Sensor Networks
-
Dec
-
A. D. Wood, J. A. Standovic, and S. H. Son, "JAM: A Jammed-Area Mapping Service for Sensor Networks," in Proc. of the 24& IEEE Real-Time Systems Symposium (HTSS), Dec 2003, pp. 286-297.
-
(2003)
Proc. of the 24& IEEE Real-Time Systems Symposium (HTSS)
, pp. 286-297
-
-
Wood, A.D.1
Standovic, J.A.2
Son, S.H.3
-
11
-
-
0041973497
-
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, In Proc. of the 22th IEEE INFOCOM 2003, April 2003, pp. 1976-1986.
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proc. of the 22th IEEE INFOCOM 2003, April 2003, pp. 1976-1986.
-
-
-
-
12
-
-
24944466187
-
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach
-
Mar
-
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L.W. Chang, "Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach," in IEEE Wireless and Communications and Networking Conference (WCNC), Mar 2005, pp. 1193-1199.
-
(2005)
IEEE Wireless and Communications and Networking Conference (WCNC)
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
15
-
-
0035271352
-
An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information Systems
-
N. Ye and Q. Chen, "An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information Systems," Quality and Reliability Engineering International, vol. 17, no. 2, 2001, pp. 105-112.
-
(2001)
Quality and Reliability Engineering International
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
19
-
-
33646589837
-
An Application-Specific Protocol Architecture for Wireless Microsensor Networks
-
Oct
-
W. B. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Transactions on Wireless Communications, vol. 1, no. 4, Oct 2002, pp. 660-670.
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.2
Balakrishnan, H.3
-
20
-
-
42549158852
-
MPR/MID User's Manual
-
Rev. B, Crossbow Technology, Inc, April
-
"MPR/MID User's Manual," Document 7430-0021-06, Rev. B, Crossbow Technology, Inc., April 2005.
-
(2005)
Document 7430-0021-06
-
-
-
21
-
-
31844451627
-
Battery Lifetime Estimation and Optimization for Underwater Sensor Networks
-
R. Jurdak, C. V. Lopes, P. Baldi, "Battery Lifetime Estimation and Optimization for Underwater Sensor Networks," IEEE Sensor Operations, 2004.
-
(2004)
IEEE Sensor Operations
-
-
Jurdak, R.1
Lopes, C.V.2
Baldi, P.3
|