-
1
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the USENIX Security Symposium, 2003, pp. 15-28.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
5
-
-
33746299217
-
Secure and efficient key management in mobile ad hoc networks
-
B. Wu, J. Wu, E. Fernandez, and S. Magliveras, "Secure and efficient key management in mobile ad hoc networks," in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2005.
-
(2005)
Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS)
-
-
Wu, B.1
Wu, J.2
Fernandez, E.3
Magliveras, S.4
-
6
-
-
26644439585
-
Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation
-
A. Wool, "Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation," ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.
-
(2005)
ACM/Springer Wireless Networks
, vol.11
, Issue.6
, pp. 677-686
-
-
Wool, A.1
-
7
-
-
51349133236
-
Detecting 802.11 MAC layer spoofing using received signal strength
-
April
-
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802.11 MAC layer spoofing using received signal strength," in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.
-
(2008)
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
-
-
Sheng, Y.1
Tan, K.2
Chen, G.3
Kotz, D.4
Campbell, A.5
-
8
-
-
48049094399
-
Detecting and localizing wirelss spoofing attacks
-
May
-
Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wirelss spoofing attacks," in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007.
-
(2007)
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Chen, Y.1
Trappe, W.2
Martin, R.P.3
-
9
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proceedings of the ACM Workshop on Wireless Security (WiSe), 2006.
-
(2006)
Proceedings of the ACM Workshop on Wireless Security (WiSe)
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
11
-
-
20344362917
-
The limits of localization using signal strength: A comparative study
-
Oct
-
E. Elnahrawy, X. Li, and R. P. Martin, "The limits of localization using signal strength: A comparative study," in Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), Oct. 2004, pp. 406-414.
-
(2004)
Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004)
, pp. 406-414
-
-
Elnahrawy, E.1
Li, X.2
Martin, R.P.3
-
12
-
-
43849090040
-
A practical approach to landmark deployment for indoor localization
-
September
-
Y. Chen, J. Francisco, W. Trappe, and R. P. Martin, "A practical approach to landmark deployment for indoor localization," in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.
-
(2006)
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Chen, Y.1
Francisco, J.2
Trappe, W.3
Martin, R.P.4
-
14
-
-
34547709836
-
Global Positioning System: Signals, Measurements and Performance
-
P. Enge and P. Misra, Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Pr, 2001.
-
(2001)
Ganga-Jamuna Pr
-
-
Enge, P.1
Misra, P.2
-
15
-
-
1542329081
-
Range-free localization schemes in large scale sensor networks
-
T. He, C. Huang, B. Blum, J. A. Stankovic, and T. Abdelzaher, "Range-free localization schemes in large scale sensor networks," in Proceedings of the Ninth Annual ACM International Conference on Mobile Computing and Networking (MobiCom'03), 2003.
-
(2003)
Proceedings of the Ninth Annual ACM International Conference on Mobile Computing and Networking (MobiCom'03)
-
-
He, T.1
Huang, C.2
Blum, B.3
Stankovic, J.A.4
Abdelzaher, T.5
-
16
-
-
33746084519
-
The robustness of localization algorithms to signal strength attacks: A comparative study
-
June
-
Y. Chen, K. Kleisouris, X. Li, W. Trappe, and R. P. Martin, "The robustness of localization algorithms to signal strength attacks: a comparative study," in Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS), June 2006, pp. 546-563.
-
(2006)
Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS)
, pp. 546-563
-
-
Chen, Y.1
Kleisouris, K.2
Li, X.3
Trappe, W.4
Martin, R.P.5
-
18
-
-
33746895103
-
Models and solutions for radio irregularity in wireless sensor networks
-
G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, "Models and solutions for radio irregularity in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 2, pp. 221-262, 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, pp. 221-262
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.A.4
-
20
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recognition Letters, Elsevier, vol. 27, pp. 861-874, 2006.
-
(2006)
Pattern Recognition Letters, Elsevier
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
21
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
November
-
P. Rousseeuw, "Silhouettes: a graphical aid to the interpretation and validation of cluster analysis," Journal of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53-65, November 1987.
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.1
-
22
-
-
70349658363
-
-
K. Wang, Estimating the number of clusters via system evolution for cluster analysis of gene expression data, Computer Science Department, Xidian University, P.R. China, Technical Report NO. 2007-258, 2007.
-
K. Wang, "Estimating the number of clusters via system evolution for cluster analysis of gene expression data," Computer Science Department, Xidian University, P.R. China, Technical Report NO. 2007-258, 2007.
-
-
-
-
23
-
-
25844491753
-
Bayesian indoor positioning systems
-
March
-
D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A. S. Krishnakumar, "Bayesian indoor positioning systems," in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2005, pp. 324-331.
-
(2005)
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
, pp. 324-331
-
-
Madigan, D.1
Elnahrawy, E.2
Martin, R.3
Ju, W.4
Krishnan, P.5
Krishnakumar, A.S.6
|