-
1
-
-
4544276923
-
A defense-centric taxonomy based on attack manifestations
-
K.S. Killourhy, R.A. Maxion, and K.M.C.Tan, "A defense-centric taxonomy based on attack manifestations," in Dependable Systems and Networks (DSN), 2004, pp.102-111.
-
(2004)
Dependable Systems and Networks (DSN)
, pp. 102-111
-
-
Killourhy, K.S.1
Maxion, R.A.2
Tan, K.M.C.3
-
2
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in Proceedings of IEEE Conference on Computer Communications (INFOCOM), 2003, pp. 1976-1986.
-
(2003)
Proceedings of IEEE Conference on Computer Communications (INFOCOM)
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
3
-
-
50249155659
-
-
G. Stuber and J. C. jr., The Mobile Communications Handbook, J.D. Gibson and E.M. Gibson ed., ch. 24, Radiolocation Techniques, CRC Press, 1999.
-
G. Stuber and J. C. jr., The Mobile Communications Handbook, J.D. Gibson and E.M. Gibson ed., ch. 24, Radiolocation Techniques, CRC Press, 1999.
-
-
-
-
5
-
-
0019574599
-
Random sample con-sensus: A paradigm for model fitting with applications to chiimage analysis and automated cartography
-
M. A. Fischler and R. C. Bolles, "Random sample con-sensus: a paradigm for model fitting with applications to chiimage analysis and automated cartography," Communications of the ACM, vol. 24, no. 6, pp. 381-395, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.6
, pp. 381-395
-
-
Fischler, M.A.1
Bolles, R.C.2
-
7
-
-
0034539094
-
The Cricket Location-Support System
-
N. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location-Support System," in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2000, pp. 32-43.
-
(2000)
Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom)
, pp. 32-43
-
-
Priyantha, N.1
Chakraborty, A.2
Balakrishnan, H.3
-
8
-
-
0034775930
-
Dynamic fine-grained localization in ad-hoc networks of sensors
-
A. Savvides, C. Han, and M. Strivastava, "Dynamic fine-grained localization in ad-hoc networks of sensors," in Proceedings of AC International Conference on Mobile Computing and Networking (MobiCom), 2001, pp. 166-179.
-
(2001)
Proceedings of AC International Conference on Mobile Computing and Networking (MobiCom)
, pp. 166-179
-
-
Savvides, A.1
Han, C.2
Strivastava, M.3
-
10
-
-
33144475948
-
Hirloc: High resolution localization for wireless sensornetworks
-
April
-
L. Lazos and R. Poovendran, "Hirloc: High resolution localization for wireless sensornetworks," IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Network Security, vol. 24, no. 2, pp. 233- 246, April 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Network Security
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
11
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust statistical methods for securing wireless localization in sensor networks." in Proceedings of The International Symposium on Information Processing in Sensor Networks (IPSN), 2005, pp. 91-98.
-
(2005)
Proceedings of The International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 91-98
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
13
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN), 2005, pp. 99- 106.
-
(2005)
Proceedings of International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
15
-
-
33745931868
-
Time synchronization attacks in sensor networks
-
M. Manzo, T. Roosta, and S. Sastry, "Time synchronization attacks in sensor networks," in Proceedings of the ACM workshop on Security of ad hoc and sensor networks (SASN), 2005, pp. 107-116.
-
(2005)
Proceedings of the ACM workshop on Security of ad hoc and sensor networks (SASN)
, pp. 107-116
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
16
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. Tygar, "Spins: Security protocols for sensor networks," in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2001, pp. 189-199.
-
(2001)
Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.5
-
18
-
-
33746042598
-
Consistency-based on-line localization in sensor networks
-
J. Feng, L. Girod, and M. Potkonjak, "Consistency-based on-line localization in sensor networks," in Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS), 2006, pp. 529-545.
-
(2006)
Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS)
, pp. 529-545
-
-
Feng, J.1
Girod, L.2
Potkonjak, M.3
-
20
-
-
0000231702
-
The distribution of chisquare
-
USA
-
E. Wilson and M. Hilferty, "The distribution of chisquare," in Proceedings of National Academy Science, USA, vol. 17, pp. 684-686, 1931.
-
(1931)
Proceedings of National Academy Science
, vol.17
, pp. 684-686
-
-
Wilson, E.1
Hilferty, M.2
-
21
-
-
0026135419
-
Robust regression methods for computer vision: A review
-
P. Meer, D. Mintz, A. Rosenfeld, and D. Yoon-Kim, "Robust regression methods for computer vision: a review," International Journal of Computer Vision, vol. 6, no. 1, pp. 59-970, 1991.
-
(1991)
International Journal of Computer Vision
, vol.6
, Issue.1
, pp. 59-970
-
-
Meer, P.1
Mintz, D.2
Rosenfeld, A.3
Yoon-Kim, D.4
|