-
1
-
-
4344696656
-
A class A/B low power amplifier for Wireless sensor networks
-
Y. Chee, J. Rabaey, and A. Niknejad, "A class A/B low power amplifier for Wireless sensor networks," in the Proceedings of the 2004 International Symposium on Circuits and Systems, vol.4, 2004, pp. 409-412.
-
(2004)
The Proceedings of the 2004 International Symposium on Circuits and Systems
, vol.4
, pp. 409-412
-
-
Chee, Y.1
Rabaey, J.2
Niknejad, A.3
-
4
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
G. Vigna, S. Gwalani, K. Srinivasan, E. M.Belding-Royer, and R. A.Kemmerer, "An intrusion detection tool for AODV-based ad hoc wireless networks," in the Proceedings of the 20th Annual Computer Security Applications Conference, 2004, pp. 16-27.
-
(2004)
The Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.M.4
Kemmerer, R.A.5
-
5
-
-
66249132210
-
Attack detection model based on routing protocol in wireless sensor networks
-
QIN Bo-ping, ZHOU Xian-wei, YANG Jun. "Attack Detection Model Based on Routing Protocol in Wireless sensor networks," Computer Engineering, vol.33, no.2, pp. 117-119.
-
Computer Engineering
, vol.33
, Issue.2
, pp. 117-119
-
-
Qin, B.-P.1
Zhou, X.-W.2
Yang, J.3
-
6
-
-
0034772133
-
Geography-informed energy conservation for ad-hoc routing
-
Y. Xu, J. Heidemann, D. Estrin, "Geography-informed Energy Conservation for Ad-hoc Routing," Proc. of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, 2001, pp. 70-84.
-
(2001)
Proc. of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 70-84
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
7
-
-
14844285433
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless sensor networks," Communications of the ACM, vol.47, no. 6, June 2005.
-
(2005)
Communications of the ACM
, vol.47
, Issue.6
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
84976699318
-
The byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. pease, "The Byzantine Generals Problem," ACM Transaction Programming Languages and Systems, vol.4, no. 3, July 1982, pp. 382-401.
-
(1982)
ACM Transaction Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
9
-
-
34648813419
-
Survey of wireless sensor network security techniques
-
[9]PEIQing-qi,SHENYu-long,andMAJian-feng," SurveyofWirelesssensornetworkssecuritytechniques,"JournalonCommunications, vol.28,no.8,August2007,113-122.(Pubitemid47453627)
-
(2007)
Tongxin Xuebao/Journal on Communication
, vol.28
, Issue.8
, pp. 113-122
-
-
Pei, Q.-Q.1
Shen, Y.-L.2
Ma, J.-F.3
-
11
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y.A. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol.9, no. 5, 2003, pp. 545-556.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
14
-
-
33747302351
-
An intrusion detection system for Wireless sensor networks
-
Ilker Onat and Ali Miri, "An intrusion detection system for Wireless sensor networks," Wireless And Mobile Computing, Networking And Communications,2005.(WiMob'2005), pp. 253-259.
-
Wireless and Mobile Computing, Networking and Communications,2005. (WiMob'2005)
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
15
-
-
35348892571
-
An anomaly detection technology in wireless sensor networks,"
-
August
-
ZHOU Xian-wei, WANG Pei, and QIN Bo-ping, "An Anomaly Detection Technology in Wireless sensor networks," CHINESE JOURNAL OF SENSORS AND ACTUATORS, vol.20,no.8, August 2007, pp. 1870-1874.
-
(2007)
Chinese Journal of Sensors and Actuators
, vol.20
, Issue.8
, pp. 1870-1874
-
-
Zhou, X.-W.1
Wang, P.A.2
Qin, B.-P.3
|