-
1
-
-
4143130116
-
-
Computer Emergency Response Team/Coordination Center
-
Computer Emergency Response Team/Coordination Center, "Denial of Service Attacks," 2001, http://www.cert.org/tech-tips/denial-of-service. html.
-
(2001)
Denial of Service Attacks
-
-
-
2
-
-
0036688074
-
A Survey on Sensor Networks
-
Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci, (2002), A Survey on Sensor Networks, IEEE Communications Magazine, Vol.40, No.8, pp 102-114.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0041472588
-
An energy efficient hierarchical clustering algorithm for wireless sensor networks
-
Seema Bandyopadhyay and E.J. Coyle (2003), An energy efficient hierarchical clustering algorithm for wireless sensor networks, INFOCOM 2003, Vol.3, pp. 1713-1723.
-
(2003)
INFOCOM 2003
, vol.3
, pp. 1713-1723
-
-
Bandyopadhyay, S.1
Coyle, E.J.2
-
4
-
-
0012797660
-
-
Mainak Chatterjee, Sajal K. Das and Damla Turgut (2002), WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks, Cluster Computing, Vol.5, No.2, pp.193-204.
-
(2002)
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks, Cluster Computing
, vol.5
, Issue.2
, pp. 193-204
-
-
Chatterjee, M.1
Das, S.K.2
Turgut, D.3
-
6
-
-
0038341106
-
Key management and key exchange: A key-management scheme for distributed sensor networks
-
Washington, DC, pp
-
Laurent Eschenauer and Virgil D. Gligor (2002), Key management and key exchange: A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, pp.41-47.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
7
-
-
0037632539
-
-
G.. Gupta and M. Younis (2003), Load-balanced clustering of wireless sensor networks, IEEE International Conference on Communications, 3, pp. 1848-1852.
-
G.. Gupta and M. Younis (2003), Load-balanced clustering of wireless sensor networks, IEEE International Conference on Communications, Vol.3, pp. 1848-1852.
-
-
-
-
11
-
-
84954446828
-
Power-efficiency clustering method with power-limit constraint for sensor networks, Power-efficiency clustering method with power-limit constraint for sensor networks
-
Jain-Shing Liu and C.-H. P. Lin (2003), Power-efficiency clustering method with power-limit constraint for sensor networks, Power-efficiency clustering method with power-limit constraint for sensor networks, Proceedings of the 2003 IEEE International Conference on Performance, Computing, and Communications, pp.129- 136.
-
(2003)
Proceedings of the 2003 IEEE International Conference on Performance, Computing, and Communications
, pp. 129-136
-
-
Liu, J.-S.1
Lin, C.-H.P.2
-
12
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, pp
-
Sergio Marti, T. J. Giuli, Kevin Lai and Mary Baker (2000), Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, pp.255-265.
-
(2000)
Proceedings of the 6th annual international conference on Mobile computing and networking
, pp. 255-265
-
-
Sergio Marti, T.J.G.1
Lai, K.2
Baker, M.3
-
13
-
-
0036964041
-
An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol
-
A.Manjeshwar, Qing-An Zeng and D.P. Agrawal (2002), An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol, IEEE Transactions on Parallel and Distributed Systems, Vol.3, No.12, pp.1290-1302.
-
(2002)
IEEE Transactions on Parallel and Distributed Systems
, vol.3
, Issue.12
, pp. 1290-1302
-
-
Manjeshwar, A.1
Zeng, Q.-A.2
Agrawal, D.P.3
-
14
-
-
3142714679
-
Energy efficient protocols for sensing multiple events in Smart Dust networks
-
S. Nikoletseas, I. Chatzigiannakis, H. Euthimiou, A. Kinalis, A. Antoniou and G. Mylonas (2004), Energy efficient protocols for sensing multiple events in Smart Dust networks, Proceedings of the 37th annual symposium on Simulation, pp. 15-24.
-
(2004)
Proceedings of the 37th annual symposium on Simulation
, pp. 15-24
-
-
Nikoletseas, S.1
Chatzigiannakis, I.2
Euthimiou, H.3
Kinalis, A.4
Antoniou, A.5
Mylonas, G.6
-
15
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
Montreal, pp
-
Ana Paula, R. da Silva, Marcelo H. T. Martins, Bruno P. S. Rocha, Antonio A. F. Loureiro, Linnyer B. Ruiz and Hao Chi Wong (2005), Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM international workshop on Quality of service&security in wireless and mobile networks, Montreal, pp.16-23.
-
(2005)
Proceedings of the 1st ACM international workshop on Quality of service&security in wireless and mobile networks
, pp. 16-23
-
-
Paula, A.1
da Silva, R.2
Martins, M.H.T.3
Rocha, B.P.S.4
Loureiro, A.A.F.5
Ruiz, L.B.6
Chi Wong, H.7
-
16
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler and J. D. Tygar (2002), SPINS: Security Protocols for Sensor Networks, Wireless Networks, Vol.8, pp.521-534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
17
-
-
0345851235
-
Wireless integrated network sensors
-
G. J. Pottie and W. J. Kaiser (2000), Wireless integrated network sensors, Communications of the ACM, Vol.43, No.5, pp. 51-58.
-
(2000)
Communications of the ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
18
-
-
33749392079
-
An energy-efficient voting-based clustering algorithm for sensor networks, First ACIS International Workshop on Self-Assembling
-
Min Qin and R. Zimmermann (2005), An energy-efficient voting-based clustering algorithm for sensor networks, First ACIS International Workshop on Self-Assembling Wireless Networks, pp. 444-451.
-
(2005)
Wireless Networks
, pp. 444-451
-
-
Qin, M.1
Zimmermann, R.2
-
19
-
-
0842331554
-
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
-
R. Rao and G. Kesidis (2003), Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited, IEEE Global Telecommunications Conference, Vol.5, pp.2957-2961.
-
(2003)
IEEE Global Telecommunications Conference
, vol.5
, pp. 2957-2961
-
-
Rao, R.1
Kesidis, G.2
-
21
-
-
0012979825
-
A taxonomy of wireless microsensor network models
-
Sameer Tilak, Nael B. Abu-Ghazaleh and Wendi Heinzelman, (2002), A taxonomy of wireless microsensor network models, ACM SIGMOBILE Mobile Computing and Communications Review, Vol.6, No.2, pp 28-36.
-
(2002)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.6
, Issue.2
, pp. 28-36
-
-
Tilak, S.1
Abu-Ghazaleh, N.B.2
Heinzelman, W.3
-
22
-
-
4544342574
-
Intrusion detection: A specification-based intrusion detection system for AODV
-
Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe and Karl Levitt (2003), Intrusion detection: A specification-based intrusion detection system for AODV, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp.125-134.
-
(2003)
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
, pp. 125-134
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
23
-
-
0036793924
-
Denial of service in sensor networks
-
A.D. Wood and J. A. Stankovic (2002), Denial of service in sensor networks, IEEE Computer, Vol.35, No.10, pp.54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
24
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
O. Younis and S. Fahmy (2004), HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing, Vol. 3, No.4, pp.366-379.
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
|