-
1
-
-
46249087291
-
Intrusion detection in sensor networks: A non-copporative game approach
-
A. Agah, S. Das, and K. Basu. Intrusion detection in sensor networks: A non-copporative game approach. In IEEE NCA 2004.
-
(2004)
IEEE NCA
-
-
Agah, A.1
Das, S.2
Basu, K.3
-
2
-
-
84996787881
-
Routing with guaranteed delivery in ad hoc wireless networks
-
P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. In DIALM 1999.
-
(1999)
DIALM
-
-
Bose, P.1
Morin, P.2
Stojmenovic, I.3
Urrutia, J.4
-
4
-
-
70350562860
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
J. Deng, R. Han, and S. Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In IEEE DSN 2004.
-
(2004)
IEEE DSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
46249086755
-
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks
-
R. Di Pietro, S. Etalle, P. Havinga, Y. W. Law, and L. V. Mancini. LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In WiSPr 2003.
-
(2003)
WiSPr
-
-
Di Pietro, R.1
Etalle, S.2
Havinga, P.3
Law, Y.W.4
Mancini, L.V.5
-
6
-
-
33749648939
-
Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment
-
R. Di Pietro, L. V. Mancini, and A. Mei. Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. In WMAN 2004.
-
(2004)
WMAN
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
7
-
-
25844521520
-
Localized faulttolerant event boundary detection in sensor networks
-
M. Ding, D. Chen, K. Xing, and X. Cheng. Localized faulttolerant event boundary detection in sensor networks. In INFOCOM 2005.
-
(2005)
INFOCOM
-
-
Ding, M.1
Chen, D.2
Xing, K.3
Cheng, X.4
-
8
-
-
3142684688
-
Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks
-
S. Doumit and D. Agrawal. Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks. In MILCOM 2003.
-
(2003)
MILCOM
-
-
Doumit, S.1
Agrawal, D.2
-
9
-
-
33746313270
-
Lad: Localization anomaly detection for wireless sensor networks
-
W. Du, L. Fang, and P. Ning, Lad: Localization anomaly detection for wireless sensor networks. In IPDPS 2005.
-
(2005)
IPDPS
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
11
-
-
8344224464
-
Locating and bypassing, routing holes in sensor networks
-
Q. Fang, J. Gao, and L. Guibas. Locating and bypassing, routing holes in sensor networks. In INFOCOM 2004.
-
(2004)
INFOCOM
-
-
Fang, Q.1
Gao, J.2
Guibas, L.3
-
12
-
-
0033877788
-
Energy-Efficient Communication Protocols for Wireless Microsensor Networks
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-Efficient Communication Protocols for Wireless Microsensor Networks. In HICSS 2000.
-
(2000)
HICSS
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
14
-
-
26444525727
-
A distributed intrusion detection approach for secure software architecture
-
P. Inverardi and L. Mostarda. A distributed intrusion detection approach for secure software architecture. In EWSA 2005.
-
(2005)
EWSA
-
-
Inverardi, P.1
Mostarda, L.2
-
15
-
-
33751090748
-
Distributed idss for enhancing security in mobile wireless sensor networks
-
P. Inverardi, L. Mostarda, and A. Navarra. Distributed idss for enhancing security in mobile wireless sensor networks. In PCAC 2006.
-
(2006)
PCAC
-
-
Inverardi, P.1
Mostarda, L.2
Navarra, A.3
-
16
-
-
70350012638
-
-
P. Inverardi, L. Mostarda, M. Tivoli, and M. Autili. Automatic synthesis of distributed adaptors for component-based system. In ASE 2005.
-
P. Inverardi, L. Mostarda, M. Tivoli, and M. Autili. Automatic synthesis of distributed adaptors for component-based system. In ASE 2005.
-
-
-
-
17
-
-
84942426861
-
Secure Routing in Sensor Networks: Attacks and Countermeasures
-
C. Karlof and D. Wagner. Secure Routing in Sensor Networks: Attacks and Countermeasures. In SNPA 2003.
-
(2003)
SNPA
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
0034547115
-
Greedy perimeter stateless routing (GPSR) for wireless networks
-
B. Karp and H. Kung. Greedy perimeter stateless routing (GPSR) for wireless networks. In MobiCom 2000.
-
(2000)
MobiCom
-
-
Karp, B.1
Kung, H.2
-
19
-
-
0030677523
-
Execution monitoring of security-critical programs in distribute system: A specification-based approach
-
C. Ko, M. Ruschitza, and K. Levitt. Execution monitoring of security-critical programs in distribute system: A specification-based approach. IEEE, 1997.
-
(1997)
IEEE
-
-
Ko, C.1
Ruschitza, M.2
Levitt, K.3
-
20
-
-
23044528941
-
GRID: A fully location-aware routing protocol for mobile ad hoc networks
-
W.-H. Liao, J.-P. Sheu, and Y.-C. Tseng. GRID: A fully location-aware routing protocol for mobile ad hoc networks. Telecommunication Systems, 18(1-3), 2001.
-
(2001)
Telecommunication Systems
, vol.18
, Issue.1-3
-
-
Liao, W.-H.1
Sheu, J.-P.2
Tseng, Y.-C.3
-
21
-
-
0038675723
-
Leader election algorithms for mobile ad hoc networks
-
N. Malpani, J. Welch, and N. Vaidya. Leader election algorithms for mobile ad hoc networks. In DIALM 2000.
-
(2000)
DIALM
-
-
Malpani, N.1
Welch, J.2
Vaidya, N.3
-
22
-
-
84962840943
-
Energetic trade-off between computing and communication resource in multimedia surveillance sensor network
-
D. Maniezzo, K. Yao, and G. Mazzini. Energetic trade-off between computing and communication resource in multimedia surveillance sensor network. In MWCN 2002.
-
(2002)
MWCN
-
-
Maniezzo, D.1
Yao, K.2
Mazzini, G.3
-
23
-
-
28444490045
-
Connectionless Probabilistic (CoP) routing; an efficient protocol for Mobile Wireless Ad-Hoc Sensor Networks
-
J. A. McCann, A. Navarra, and A. A. Papadopoulos. Connectionless Probabilistic (CoP) routing; an efficient protocol for Mobile Wireless Ad-Hoc Sensor Networks. In IPCCC 2005.
-
(2005)
IPCCC
-
-
McCann, J.A.1
Navarra, A.2
Papadopoulos, A.A.3
-
24
-
-
85085717737
-
Sensor-based intrusion detection for intra-domain distance-vector routing
-
V. Mittal and G. Vigne. Sensor-based intrusion detection for intra-domain distance-vector routing. In ACM CSS 2002.
-
(2002)
ACM CSS
-
-
Mittal, V.1
Vigne, G.2
-
26
-
-
33750961928
-
An EFSM-based intrusion detection system for ad hoc networks
-
J.-M. Orset, B. Alcalde, and A. Cavalli. An EFSM-based intrusion detection system for ad hoc networks. In ATVA 2005.
-
(2005)
ATVA
-
-
Orset, J.-M.1
Alcalde, B.2
Cavalli, A.3
-
27
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
28
-
-
33845568201
-
Secure Location Verification Using Radio Broadcast
-
A. Vora and M. Nesterenko. Secure Location Verification Using Radio Broadcast. In OPODIS 2004.
-
(2004)
OPODIS
-
-
Vora, A.1
Nesterenko, M.2
-
29
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireliless Networks, pp. 545-556, 2003.
-
(2003)
Wireliless Networks
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|