-
1
-
-
0346637389
-
A taxonomy of dispersity routing schemes for fault tolerant real-tiem channels
-
May
-
A. Banerjea. A taxonomy of dispersity routing schemes for fault tolerant real-tiem channels. In Proceedings ofECMAST, volume 26, pages 129-148, May 1999.
-
(1999)
Proceedings of ECMAST
, vol.26
, pp. 129-148
-
-
Banerjea, A.1
-
3
-
-
43849090040
-
A practical approach to landmark deployment for indoor localization
-
September
-
Y. Chen, J. Francisco, W. Trappe, and R. P. Martin. A practical approach to landmark deployment for indoor localization. In Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.
-
(2006)
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Chen, Y.1
Francisco, J.2
Trappe, W.3
Martin, R.P.4
-
4
-
-
33746084519
-
The robustness of localization algorithms to signal strength attacks: A comparative study
-
4026 LNCS Distributed Computing in Sensor Systems - Second IEEE International Conference, DCOSS 2006, Proceedings
-
Y. Chen, K. Kleisouris, X. Li, W. Trappe, and R. P. Martin. The robustness of localization algorithms to signal strength attacks: a comparative study. In Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 546-563, June 2006. (Pubitemid 44077847)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 546-563
-
-
Chen, Y.1
Kleisouris, K.2
Li, X.3
Trappe, W.4
Martin, R.P.5
-
6
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
November
-
M. Demirbas and Y. Song. An rssi-based scheme for sybil attack detection in wireless sensor networks. In Proceedings of the International Workshop on Advanced Experimental Activities on Wireless Networks and Systems, 2006. [6] L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (CCS), November 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security (CCS)
-
-
Eschenauer, L.1
Gligo, V.D.2
-
7
-
-
0003684449
-
-
Springer
-
T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning, Data Mining Inference, and Prediction. Springer, 2001.
-
(2001)
The Elements of Statistical Learning, Data Mining Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
12
-
-
0036738266
-
Spins:Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Ty-gar. Spins: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, September 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Ty-gar, J.5
-
13
-
-
51349133236
-
Detecting 802.11 mac layer spoofing using received signal strength
-
April
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell. Detecting 802.11 mac layer spoofing using received signal strength. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.
-
(2008)
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
16
-
-
33746895103
-
Models and solutions for radio irregularity in wireless sensor networks
-
DOI 10.1145/1149283.1149287
-
G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic. Models and solutions for radio irregularity in wireless sensor networks. ACM Transactions on Sensor Networks, 2:221-262,2006. (Pubitemid 44188495)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.2
, pp. 221-262
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.A.4
|