-
1
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. Proceedings ACM MobiCom, July 2001; 189-199.
-
(2001)
Proceedings ACM MobiCom
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
3
-
-
27644599432
-
ARRIVE: Algorithm for robust routing in volatile environments
-
Technical Report UCB//CSD-03-1233, University of California at Berkeley
-
Karlof C, Li Y, Polastre J. ARRIVE: algorithm for robust routing in volatile environments. Technical Report UCB//CSD-03-1233, University of California at Berkeley, 2003.
-
(2003)
-
-
Karlof, C.1
Li, Y.2
Polastre, J.3
-
4
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Karlof C, Sastry N, Wagner D. TinySec: a link layer security architecture for wireless sensor networks. Proceedings of ACM SenSys, 2004.
-
(2004)
Proceedings of ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
36349021963
-
Security for wireless sensor networks
-
Chapter 1. Kluwer Academic Publishers: Norwell
-
Avancha A, Undercoffer J, Joshi A, Pinkston J. Security for wireless sensor networks. In Wireless Sensor Networks, Chapter 1. Kluwer Academic Publishers: Norwell, 2004; 253-275.
-
(2004)
Wireless Sensor Networks
, pp. 253-275
-
-
Avancha, A.1
Undercoffer, J.2
Joshi, A.3
Pinkston, J.4
-
6
-
-
2942656255
-
Secure routinginwireless sensor networks: Attacks and countermeasures
-
Karlof C, Wagner D. Secure routinginwireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003; 1: 293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas Z. Securing ad hoc networks. IEEE Network Magazine; 1999; 13(6): 24-30.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
9
-
-
2442604387
-
A game theory based approach for security in wireless sensor networks
-
Phoenix, AZ, April
-
Agah A, Das SK, Basu K. A game theory based approach for security in wireless sensor networks. Proceedings of the International Performance Computing and Communications Conference (IPCC), Phoenix, AZ, April 2004.
-
(2004)
Proceedings of the International Performance Computing and Communications Conference (IPCC)
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
-
10
-
-
34250351345
-
Intrusion detection on sensor networks using emotional ants
-
Banerjee S, Grosan C, Abraham A, Mahanti P. Intrusion detection on sensor networks using emotional ants. International Journal of Applied Science and Computations 2005; 12(3): 152-173.
-
(2005)
International Journal of Applied Science and Computations
, vol.12
, Issue.3
, pp. 152-173
-
-
Banerjee, S.1
Grosan, C.2
Abraham, A.3
Mahanti, P.4
-
11
-
-
53849148915
-
-
Chandrasekar R, Misra S, Obaidat MS. FORK: a novel strategy to an agent-based intrusion detection scheme in mobile ad-hoc networks. Computer Communications 2008; (in press). 31(16): 3855-3869.
-
Chandrasekar R, Misra S, Obaidat MS. FORK: a novel strategy to an agent-based intrusion detection scheme in mobile ad-hoc networks. Computer Communications 2008; (in press). 31(16): 3855-3869.
-
-
-
-
12
-
-
44349137568
-
-
Chandrasekar R, Obaidat MS, Misra S, Peña-Mora F. A secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis. SIMULATION: Transactions of the Society for Modeling and Simulation International 2008; 84(2/3): 131-146.
-
Chandrasekar R, Obaidat MS, Misra S, Peña-Mora F. A secure data-centric scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis. SIMULATION: Transactions of the Society for Modeling and Simulation International 2008; 84(2/3): 131-146.
-
-
-
-
13
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
ISSN 1550-1329
-
Loo C, Ng M, Leckie C, Palaniswami M. Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks 2006; 2(4): 313-332. ISSN 1550-1329.
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.4
, pp. 313-332
-
-
Loo, C.1
Ng, M.2
Leckie, C.3
Palaniswami, M.4
-
15
-
-
56749136456
-
Energy efficient intrusion detection in camera sensor networks
-
Santa Fe, New Mexico, USA, June
-
Skraba P, Guibas L. Energy efficient intrusion detection in camera sensor networks. Proceedings of the International Conference on Distributed Sensor Systems (DCOSS'07), Santa Fe, New Mexico, USA, June 2007.
-
(2007)
Proceedings of the International Conference on Distributed Sensor Systems (DCOSS'07)
-
-
Skraba, P.1
Guibas, L.2
-
16
-
-
80053424324
-
Intrusion detection and failure recovery in sensor nodes
-
Tagungsband INFORMATIK 2005 Workshop Proceedings, Heidelberg, Germany, September, Springer-Verlag
-
Vogt H, Ringwald M, Strasser M. Intrusion detection and failure recovery in sensor nodes. Tagungsband INFORMATIK 2005 Workshop Proceedings, LNCS, Heidelberg, Germany, September 2005; Springer-Verlag.
-
(2005)
LNCS
-
-
Vogt, H.1
Ringwald, M.2
Strasser, M.3
-
17
-
-
42649126015
-
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
-
Wang Y, Wang X, Xie B, Wang D, Agrawal DP. Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing 2008; 7(6): 698-711.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.6
, pp. 698-711
-
-
Wang, Y.1
Wang, X.2
Xie, B.3
Wang, D.4
Agrawal, D.P.5
-
20
-
-
0036894188
-
Learning automata: Theory, paradigms, and applications
-
Obaidat MS, Papadimitriou GI, Pomportsis AS. Learning automata: theory, paradigms, and applications. IEEE Transactions on Systems, Man, and Cybernetics-Part B 2002; 32(6): 706-709.
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics-Part B
, vol.32
, Issue.6
, pp. 706-709
-
-
Obaidat, M.S.1
Papadimitriou, G.I.2
Pomportsis, A.S.3
-
21
-
-
0036896965
-
Discretized learning automata solutions to the capacity assignment problem for prioritized networks
-
Oommen BJ, Roberts TD. Discretized learning automata solutions to the capacity assignment problem for prioritized networks. IEEE Transactions on Systems, Man, and Cybernetics 2002; 32(6): 821-831.
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.32
, Issue.6
, pp. 821-831
-
-
Oommen, B.J.1
Roberts, T.D.2
-
22
-
-
0043037129
-
A framework for passive packet measurement
-
February
-
Duffield N, Greenberg A, Grossglauser M, Rexford J. A framework for passive packet measurement. IETF Draft, draftduffield-framework-papame-01, February 2002.
-
(2002)
IETF Draft, draftduffield-framework-papame-01
-
-
Duffield, N.1
Greenberg, A.2
Grossglauser, M.3
Rexford, J.4
-
23
-
-
0032651125
-
-
Ott TJ, Lakshman TV, Wong LH. SRED: Stabilized RED. Proceedings of INFOCOM, 1999; 1346-1355.
-
Ott TJ, Lakshman TV, Wong LH. SRED: Stabilized RED. Proceedings of INFOCOM, 1999; 1346-1355.
-
-
-
-
24
-
-
34147120474
-
Anote ontwo problemsinconnection with graphs
-
Dijkstra EW. Anote ontwo problemsinconnection with graphs. Numerische Mathematik 1959; 1: 269-2271.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-2271
-
-
Dijkstra, E.W.1
|