-
1
-
-
0027610755
-
The consensus problem in fault-tolerant computing
-
M. Barborak, A. Dahbura, and M, Malek. The consensus problem in fault-tolerant computing. ACM Computing Surveys, 25(2): 171-220, 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.2
, pp. 171-220
-
-
Barborak, M.1
Dahbura, A.2
Malek, M.3
-
2
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
V. Bhuse and A. Gupta. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 15:33-51, 2006.
-
(2006)
Journal of High Speed Networks
, vol.15
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
4
-
-
34247114268
-
Diagnosing anomalies and identifying faulty nodes in sensor networks
-
V. Chatzigiannakis and S. Papavassiliou. Diagnosing anomalies and identifying faulty nodes in sensor networks. IEEE Sensors Journal, 7(5):637-645, 2007.
-
(2007)
IEEE Sensors Journal
, vol.7
, Issue.5
, pp. 637-645
-
-
Chatzigiannakis, V.1
Papavassiliou, S.2
-
5
-
-
32144435943
-
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proc. of the 1st ACM Int. workshop on Quality of service & security in wireless and mobile networks (Q2SWinet'05), pages 16-23, Canada, oct 2005.
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proc. of the 1st ACM Int. workshop on Quality of service & security in wireless and mobile networks (Q2SWinet'05), pages 16-23, Canada, oct 2005.
-
-
-
-
7
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
Oct
-
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. Directed diffusion for wireless sensor networking. IEEE/ACM Trans. on Networking, 11(1):2-16, Oct 2003.
-
(2003)
IEEE/ACM Trans. on Networking
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
8
-
-
35348928856
-
-
C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami. Intrusion detection for routing attacks in sensor networks. Int. Journal of Distributed Sensor Networks, 2:313-332, 2006.
-
C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami. Intrusion detection for routing attacks in sensor networks. Int. Journal of Distributed Sensor Networks, 2:313-332, 2006.
-
-
-
-
10
-
-
33750300697
-
LSec: Lightweight security protocol for distributed wireless sensor network
-
11th IFIP Int. Conf. on Personal Wireless Comm, Albacete, Spain, Sept
-
R. A. Shaikh, S. Lee, M. A. U. Khan, and Y. J. Song. LSec: Lightweight security protocol for distributed wireless sensor network. In 11th IFIP Int. Conf. on Personal Wireless Comm., LNCS 4217, pages 367-377, Albacete, Spain, Sept. 2006.
-
(2006)
LNCS
, vol.4217
, pp. 367-377
-
-
Shaikh, R.A.1
Lee, S.2
Khan, M.A.U.3
Song, Y.J.4
-
11
-
-
58349086741
-
Analysis of the reliability and behavior of majority and plurality voting systems
-
Apr
-
S. Yacoub, X. Lin, and J. Burns. Analysis of the reliability and behavior of majority and plurality voting systems. In Technical Report (HPL-2002-118), Information Infrastructure Laboratory, HP Laboratories Palo Alto, Apr, 2002.
-
(2002)
Technical Report (HPL-2002-118), Information Infrastructure Laboratory, HP Laboratories Palo Alto
-
-
Yacoub, S.1
Lin, X.2
Burns, J.3
-
12
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks
-
Oct
-
O. Younis and S. Fahmy. HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks. IEEE Trans. on Mobile Computing, 3(4):366-379, Oct 2004.
-
(2004)
IEEE Trans. on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
13
-
-
41549167232
-
A framework for identifying compromised nodes in wireless sensor networks
-
1 l(3):l-37
-
Q. Zhang, T. Yu, and P. Ning. A framework for identifying compromised nodes in wireless sensor networks. ACM Trans. Inf. Syst. Secur., 1 l(3):l-37, 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur
-
-
Zhang, Q.1
Yu, T.2
Ning, P.3
|