-
1
-
-
78951488729
-
Intrusion detection in sensor networks: A non-cooperative game approach
-
A. Agah, S. Das, K. Basu, and M. Asadi. Intrusion detection in sensor networks: A non-cooperative game approach. Proc. of ICWN'06. 2006, pp. 29-36.
-
(2006)
Proc. of ICWN'06
, pp. 29-36
-
-
Agah, A.1
Das, S.2
Basu, K.3
Asadi, M.4
-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. Akyildiz, W. Su Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey. Computer Networks. Vol. 38, 2002, pp. 393-422.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
S. Buchegger and J. Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. Proc. of PDP'02. 2002, pp. 403-410.
-
(2002)
Proc. of PDP'02
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.2
-
5
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes fairness in dynamic ad-hoc networks
-
S. Buchegger and J. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes fairness in dynamic ad-hoc networks. Proc. of MobiHoc'02. 2002, pp. 226-236.
-
(2002)
Proc. of MobiHoc'02
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.2
-
7
-
-
10744232231
-
Energy-efficient area monitoring for sensor networks
-
Feb
-
J. Carle and D. Simplot-Ryl. Energy-efficient area monitoring for sensor networks. Computer. Vol. 37, Issue 2, Feb. 2004, pp. 40-46.
-
(2004)
Computer
, vol.37
, Issue.2
, pp. 40-46
-
-
Carle, J.1
Simplot-Ryl, D.2
-
8
-
-
0036736383
-
An incremental self-deployment algorithm for mobile sensor networks
-
Sept
-
A. Howard, M. Mataric, and G. Sukhatme. An incremental self-deployment algorithm for mobile sensor networks. Autonomous Robots, Special Issue on Intelligent Embedded Systems. Vol. 13, No. 2, Sept. 2002, pp. 113-126.
-
(2002)
Autonomous Robots, Special Issue on Intelligent Embedded Systems
, vol.13
, Issue.2
, pp. 113-126
-
-
Howard, A.1
Mataric, M.2
Sukhatme, G.3
-
9
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
F. Hu and N. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks. Vol. 3, No. 1, 2005, pp. 69-89.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.2
-
10
-
-
50249109858
-
-
Y. Hu, A. Perrig, and D. Johnson. Wormhole detection in wireless ad hoc networks. Technical report, Rice University Department of Computer Science. June 2002, available at http://citeseer.ist.psu.edu/hu02wormhole. html.
-
Y. Hu, A. Perrig, and D. Johnson. Wormhole detection in wireless ad hoc networks. Technical report, Rice University Department of Computer Science. June 2002, available at http://citeseer.ist.psu.edu/hu02wormhole. html.
-
-
-
-
11
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karloff and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks. Vol. 1, Nos. 2-3, 2003, pp. 293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karloff, C.1
Wagner, D.2
-
13
-
-
33646437020
-
Movement-assisted sensor deployment
-
June
-
G. Wang, G. Cao, and T. Porta. Movement-assisted sensor deployment. IEEE Transactions on Mobile Computing. Vol. 5 No. 6, June. 2006, pp. 640-652.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.6
, pp. 640-652
-
-
Wang, G.1
Cao, G.2
Porta, T.3
-
14
-
-
25644454458
-
SMART: A scan-based movement-assisted sensor deployment method in wireless sensor networks
-
March
-
J. Wu and S. Yang. SMART: A scan-based movement-assisted sensor deployment method in wireless sensor networks. Proc. of INFOCOM 2005. Vol. 4, March 2005, pp. 2313-2324.
-
(2005)
Proc. of INFOCOM 2005
, vol.4
, pp. 2313-2324
-
-
Wu, J.1
Yang, S.2
-
15
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: Attack and defense strategies. IEEE Network. Vol. 20, No. 3. 2006, pp. 41-47.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
|