-
1
-
-
85048913988
-
Towards a resilient operating system for wireless sensor networks
-
Boston, MA, June
-
H. Kim, H. Cha, Towards a resilient operating system for wireless sensor networks, in: USENIX Annual Technical Conference, Boston, MA, June 2006, pp. 103-108.
-
(2006)
USENIX Annual Technical Conference
, pp. 103-108
-
-
Kim, H.1
Cha, H.2
-
2
-
-
0041472588
-
-
S. Bandyopadhyay, E.J. Coyle, An energy efficient hierarchical clustering algorithm for wireless sensor networks, in: IEEE INFOCOM 2003, San Francisco, CA, 2003, pp. 1713-1723.
-
S. Bandyopadhyay, E.J. Coyle, An energy efficient hierarchical clustering algorithm for wireless sensor networks, in: IEEE INFOCOM 2003, San Francisco, CA, 2003, pp. 1713-1723.
-
-
-
-
3
-
-
67650595777
-
-
URL
-
URL: .
-
-
-
-
4
-
-
34748826946
-
Memory safety and untrusted extensions for TinyOS
-
Tech Report UUCS-05-009, University of Utah, School of Computing
-
J. Regehr, N. Cooprider, W. Archer, E. Eide, Memory safety and untrusted extensions for TinyOS, Tech Report UUCS-05-009, University of Utah, School of Computing, 2005.
-
(2005)
-
-
Regehr, J.1
Cooprider, N.2
Archer, W.3
Eide, E.4
-
5
-
-
0742276097
-
Inside the slammer worm
-
Moore D., Paxson V., Savage S., Shannon C., Staniford S., and Weaver N. Inside the slammer worm. IEEE Security and Privacy 1 4 (2003) 33-39
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
6
-
-
34547408793
-
Understanding the causes of packet delivery success and failure in dense wireless sensor networks
-
Boulder, CO
-
K. Srinivasan, P. Dutta, A. Tavakoli, P. Levis, Understanding the causes of packet delivery success and failure in dense wireless sensor networks, in: ACM Sensys'06, Boulder, CO, 2006, pp. 419-420.
-
(2006)
ACM Sensys'06
, pp. 419-420
-
-
Srinivasan, K.1
Dutta, P.2
Tavakoli, A.3
Levis, P.4
-
8
-
-
39049104692
-
Bluetooth worm: Models, dynamics, and defense implications
-
Miami, FL, December
-
G. Yan, S. Eidenbenz, Bluetooth worm: models, dynamics, and defense implications, in: 22nd Annual Computer Security Applications Conference (ACSAC'06), Miami, FL, December 2006, pp. 245-256.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC'06)
, pp. 245-256
-
-
Yan, G.1
Eidenbenz, S.2
-
9
-
-
67650597398
-
-
G. Yan, S. Eidenbenz, Modeling propagation dynamics of bluetooth worms, in: IEEE ICDCS'07, Toronto, Canada, June 2007.
-
G. Yan, S. Eidenbenz, Modeling propagation dynamics of bluetooth worms, in: IEEE ICDCS'07, Toronto, Canada, June 2007.
-
-
-
-
10
-
-
67650577980
-
-
S.A. Khayam, H. Radha, A topologically-aware worm propagation model for wireless sensor networks, in: IEEE ICDCS International Workshop on Security in Distributed Computing Systems, June 2005, pp. 210-216.
-
S.A. Khayam, H. Radha, A topologically-aware worm propagation model for wireless sensor networks, in: IEEE ICDCS International Workshop on Security in Distributed Computing Systems, June 2005, pp. 210-216.
-
-
-
-
11
-
-
33845945205
-
Modeling node compromise spread in wireless sensor networks using epidemic theory
-
P. De, Y. Liu, S.K. Das, Modeling node compromise spread in wireless sensor networks using epidemic theory, in: International Workshop on Wireless Mobile Multimedia, 2006, pp. 237-243
-
(2006)
International Workshop on Wireless Mobile Multimedia
, pp. 237-243
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
12
-
-
0013465021
-
Random graphs as models of networks
-
Bornholdt S., and Schuster H.G. (Eds), Wiley-VCH, Berlin
-
Newman M.E.J. Random graphs as models of networks. In: Bornholdt S., and Schuster H.G. (Eds). Handbook of Graphs and Networks (2003), Wiley-VCH, Berlin
-
(2003)
Handbook of Graphs and Networks
-
-
Newman, M.E.J.1
-
14
-
-
18844399081
-
TOSSIM: Accurate and scalable simulation of entire TinyOS applications
-
Los Angeles, CA
-
P. Levis, N. Lee, M. Welsh, D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, in: ACM Sensys 2003, Los Angeles, CA, 2003, pp. 126-137.
-
(2003)
ACM Sensys 2003
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
15
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet email worm
-
Zou C.C., Towsley D., and Gong W. Modeling and simulation study of the propagation and defense of internet email worm. IEEE Transaction on Dependable and Secure Computing 4 2 (2007) 105-118
-
(2007)
IEEE Transaction on Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
16
-
-
67650573993
-
-
URL
-
TinyOS, URL: .
-
-
-
-
17
-
-
67650628573
-
-
CrossBow Corporation, URL
-
CrossBow Corporation, URL: .
-
-
-
-
18
-
-
67650624686
-
-
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard, 802.15.4-2003, May 2003, ISBN 0-7381-3677-5.
-
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard, 802.15.4-2003, May 2003, ISBN 0-7381-3677-5.
-
-
-
-
19
-
-
84892785680
-
Improving sensor network immunity under worm attacks: A software diversity approach
-
Hong Kong
-
Y. Yang, S. Zhu, G. Cao, Improving sensor network immunity under worm attacks: a software diversity approach, in: ACM Mobihoc'08, Hong Kong, 2008.
-
(2008)
ACM Mobihoc'08
-
-
Yang, Y.1
Zhu, S.2
Cao, G.3
-
20
-
-
33746895103
-
Models and solutions for radio irregularity in wireless sensor networks
-
Zhou G., He T., Krishnamurthy S., and Stankovic J.A. Models and solutions for radio irregularity in wireless sensor networks. ACM Transactions on Sensor Networks 2 2 (2006) 221-262
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.2
, pp. 221-262
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.A.4
-
21
-
-
21844473050
-
Comparison of routing metrics for static multi-hop wireless networks
-
Portland, OR, September
-
R. Draves, J. Padhye, B. Zill, Comparison of routing metrics for static multi-hop wireless networks, in: ACM SIGCOM'04, Portland, OR, September 2004, pp. 133-144.
-
(2004)
ACM SIGCOM'04
, pp. 133-144
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
22
-
-
77954257263
-
Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links
-
November, Sydney, Australia, pp
-
Y. Gu, T. He, Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links, in: ACM Sensys'07, November 2007, Sydney, Australia, pp. 321-344.
-
(2007)
ACM Sensys'07
, pp. 321-344
-
-
Gu, Y.1
He, T.2
-
23
-
-
47949103447
-
A feasibility study on defending against ultra-fast topological worms
-
Galway, Ireland, September
-
L. Xie, Sencun Zhu, A feasibility study on defending against ultra-fast topological worms, in: Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P'07), Galway, Ireland, September 2007.
-
(2007)
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P'07)
-
-
Xie, L.1
Zhu, S.2
-
24
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
To appear in, Rio de Janeiro, Brazil
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, A. Nucci, A social network based patching scheme for worm containment in cellular networks, To appear in IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
-
(2009)
IEEE INFOCOM
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
25
-
-
33750425520
-
Secure group communication in wireless sensor networks
-
Phuket, Thailand
-
S.K. Ghosh, R.K. Patro, M. Raina, C. Thejaswi, V. Ganapathy, Secure group communication in wireless sensor networks, in: First International Symposium on Wireless Pervasive Computing, Phuket, Thailand, 2006.
-
(2006)
First International Symposium on Wireless Pervasive Computing
-
-
Ghosh, S.K.1
Patro, R.K.2
Raina, M.3
Thejaswi, C.4
Ganapathy, V.5
|