-
1
-
-
37949034258
-
SPNP Users Manual Version 6
-
Department Electrical Engineering, Duke University
-
G. Ciardo, R. M. Fricks, J. K. Muppala, and K. S. Trivedi, Department Electrical Engineering, Duke University, "SPNP Users Manual Version 6," 1999.
-
(1999)
-
-
Ciardo, G.1
Fricks, R.M.2
Muppala, J.K.3
Trivedi, K.S.4
-
2
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
July-Sept
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 3, pp. 233-247, July-Sept. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
3
-
-
28244455776
-
On the lifetime of wireless sensor networks
-
Nov
-
Y. Chen and Q. Zhao, "On the lifetime of wireless sensor networks," IEEE Communications Letters, vol. 9, no. 11, pp. 976-978, Nov. 2005.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.11
, pp. 976-978
-
-
Chen, Y.1
Zhao, Q.2
-
4
-
-
77949267289
-
Quantitative assessment of operational security: Models and tools Laboratory for Analysis and Architecture of Systems
-
Technical Report 96493, May
-
M. Dacier, Y. Deswarte, and M. Kaâniche, Quantitative assessment of operational security: Models and tools Laboratory for Analysis and Architecture of Systems, Technical Report 96493, May 1996.
-
(1996)
-
-
Dacier, M.1
Deswarte, Y.2
Kaâniche, M.3
-
6
-
-
77949269102
-
Byzantine failures and security: Arbitrary is not (always) random Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences
-
Technical Report IC/2003/20
-
F. C. Gärtner, Byzantine failures and security: Arbitrary is not (always) random Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences, Technical Report IC/2003/20, 2003.
-
(2003)
-
-
Gärtner, F.C.1
-
7
-
-
41049089099
-
Node density control for maximizing wireless sensor network lifetime
-
March
-
M. Esseghir and N. Bouabdallah, "Node density control for maximizing wireless sensor network lifetime," Int'l Journal of Network Management, vol. 18, no. 2, pp. 159-170, March 2008.
-
(2008)
Int'l Journal of Network Management
, vol.18
, Issue.2
, pp. 159-170
-
-
Esseghir, M.1
Bouabdallah, N.2
-
8
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
April
-
E. Jonsson and T. Olovsson, "A quantitative model of the security intrusion process based on attacker behavior," IEEE Trans. Software Engineering, vol. 23, no. 4, pp. 235-245, April 1997.
-
(1997)
IEEE Trans. Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
9
-
-
77949274695
-
-
T. Karygiannis and L. Owens, Wireless Network Security: 802.11, Bluetooth and Handheld Devices.: National Institute of Standards and Technology (NIST), 2002, pp. 800-48, Special Publication.
-
T. Karygiannis and L. Owens, Wireless Network Security: 802.11, Bluetooth and Handheld Devices.: National Institute of Standards and Technology (NIST), 2002, pp. 800-48, Special Publication.
-
-
-
-
10
-
-
77949272825
-
The utility of partial knowledge in behavior models: An evaluation for intrusion detection
-
Z. Li and A. Das, "The utility of partial knowledge in behavior models: An evaluation for intrusion detection," Int'l Journal of Network Security, vol. 1, no. 3, pp. 138-146, 2005.
-
(2005)
Int'l Journal of Network Security
, vol.1
, Issue.3
, pp. 138-146
-
-
Li, Z.1
Das, A.2
-
11
-
-
24344463001
-
Probabilistic power management for wireless ad hoc networks
-
Oct
-
Z. Li and B. Li, "Probabilistic power management for wireless ad hoc networks," ACM Mobile Networks and Applications, vol. 10, no. 5, pp. 771-782, Oct. 2005.
-
(2005)
ACM Mobile Networks and Applications
, vol.10
, Issue.5
, pp. 771-782
-
-
Li, Z.1
Li, B.2
-
12
-
-
84942438500
-
Batch rekeying for secure group communications
-
Hong Kong, May
-
X. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch rekeying for secure group communications," in Proc. 10th Int'l Conf. on World Wide Web, Hong Kong, May 2001, pp. 525-534.
-
(2001)
Proc. 10th Int'l Conf. on World Wide Web
, pp. 525-534
-
-
Li, X.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
13
-
-
4544291032
-
System Lifetime Optimization for Heterogeneous Sensor Networks with a Hub-spoke Technology
-
July/Aug
-
Y. Ma and J. H. Aylor, "System Lifetime Optimization for Heterogeneous Sensor Networks with a Hub-spoke Technology," IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 286-294, July/Aug. 2004.
-
(2004)
IEEE Trans. Mobile Computing
, vol.3
, Issue.3
, pp. 286-294
-
-
Ma, Y.1
Aylor, J.H.2
-
14
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
B. B. Madan, K. G. Popstojanova, K. Vaidyanathan, and K. S. Trivedi, "A method for modeling and quantifying the security attributes of intrusion tolerant systems," Performance Evaluation, vol. 56, no. 1-4, pp. 167-186, 2004.
-
(2004)
Performance Evaluation
, vol.56
, Issue.1-4
, pp. 167-186
-
-
Madan, B.B.1
Popstojanova, K.G.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
15
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
Washington, D.C, June
-
B. B. Madan, K. G. Popstojanova, K. Vaidyanathan, and K. S. Trivedi, "Modeling and quantification of security attributes of software systems," in Int'l Conf. Dependable Systems and Networks, Washington, D.C., June 2002, pp. 505-514.
-
(2002)
Int'l Conf. Dependable Systems and Networks
, pp. 505-514
-
-
Madan, B.B.1
Popstojanova, K.G.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
16
-
-
0036969415
-
Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks
-
E. Melo and M. Liu, "Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks," IEEE Globecom, pp. 21-25, 2002.
-
(2002)
IEEE Globecom
, pp. 21-25
-
-
Melo, E.1
Liu, M.2
-
17
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Jan.-March
-
D. M. Nicol, W. H. Sanders, and K. S. Trivedi, "Model-based evaluation: From dependability to security," IEEE Trans. Dependability and Secure Computing, vol. 1, no. 1, pp. 48-65, Jan.-March 2004.
-
(2004)
IEEE Trans. Dependability and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
18
-
-
84874825833
-
A game theoretic formulation for intrusion detection in mobile ad hoc networks
-
A. Patcha and J. M. Park, "A game theoretic formulation for intrusion detection in mobile ad hoc networks," Int'l Journal of Network Security, vol. 2, no. 2, pp. 131-137, 2006.
-
(2006)
Int'l Journal of Network Security
, vol.2
, Issue.2
, pp. 131-137
-
-
Patcha, A.1
Park, J.M.2
-
20
-
-
33847697727
-
MEERA: Cross-layer methodology for energy efficient resource allocation in wireless networks
-
Jan
-
S. Pillin, R. Mangharam, B. Bougard, L. Van der Perr, I. Moerman, R. Rajkumar, and F. Catthoor, "MEERA: Cross-layer methodology for energy efficient resource allocation in wireless networks," IEEE Trans. Wireless Communications, vol. 6, no. 2, pp. 617-618, Jan. 2008.
-
(2008)
IEEE Trans. Wireless Communications
, vol.6
, Issue.2
, pp. 617-618
-
-
Pillin, S.1
Mangharam, R.2
Bougard, B.3
Van der Perr, L.4
Moerman, I.5
Rajkumar, R.6
Catthoor, F.7
-
21
-
-
84964425047
-
Characterizing Intrusion tolerant systems using a state transition model
-
June
-
K. G. Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K. S. Trivedi, and B. Muthusamy, "Characterizing Intrusion tolerant systems using a state transition model," in Proc. the DARPA Information Survivability Conf. and Exposition, June 2001, vol. 2, pp. 211-221.
-
(2001)
Proc. the DARPA Information Survivability Conf. and Exposition
, vol.2
, pp. 211-221
-
-
Popstojanova, K.G.1
Wang, F.2
Wang, R.3
Gong, F.4
Vaidyanathan, K.5
Trivedi, K.S.6
Muthusamy, B.7
-
23
-
-
31844457317
-
Energy and delay-constrained routing in mobile ad hoc networks: An initial approach
-
Montreal, Quebec, Canada, Oct
-
L. Sánchez-Miquel, N. Vesselinova-Vassileva, and F. Barcelü, "Energy and delay-constrained routing in mobile ad hoc networks: An initial approach," in Proc. the 2nd ACM Int'l Workshop on Performance Evaluation of Wireless Ad hoc, Sensor, and Ubiquitous Networks, Montreal, Quebec, Canada, Oct. 2005, pp. 262-263.
-
(2005)
Proc. the 2nd ACM Int'l Workshop on Performance Evaluation of Wireless Ad hoc, Sensor, and Ubiquitous Networks
, pp. 262-263
-
-
Sánchez-Miquel, L.1
Vesselinova-Vassileva, N.2
Barcelü, F.3
-
24
-
-
35548989025
-
TITAN: On-demand topology management in ad hoc networks
-
Jan
-
C. Sengul and R. Kravets, "TITAN: On-demand topology management in ad hoc networks," ACM SIGMOBILE Mobile Computing and Communication Review, vol. 9, no. 1, pp. 77-82, Jan. 2005.
-
(2005)
ACM SIGMOBILE Mobile Computing and Communication Review
, vol.9
, Issue.1
, pp. 77-82
-
-
Sengul, C.1
Kravets, R.2
-
25
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
Jan
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. 3rd ACM Conf. on Computer and Communications Security, Jan. 1996, pp. 31-37.
-
(1996)
Proc. 3rd ACM Conf. on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
26
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information system
-
Oct
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. F. Meyer, W. H. Sanders, and P. Pal, "Model-based validation of an intrusion-tolerant information system," in Proc. the 23rd Symposium Reliable Distributed Systems, Oct. 2004, pp. 184-194.
-
(2004)
Proc. the 23rd Symposium Reliable Distributed Systems
, pp. 184-194
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
-
27
-
-
33747597299
-
Energy optimization under informed mobility
-
Sep
-
C. Tang and P. K. McKinley, "Energy optimization under informed mobility," IEEE Trans. Parallel and Distributed Systems, vol. 17, no. 9, pp. 947-962, Sep. 2006.
-
(2006)
IEEE Trans. Parallel and Distributed Systems
, vol.17
, Issue.9
, pp. 947-962
-
-
Tang, C.1
McKinley, P.K.2
-
28
-
-
2642526260
-
Security analysis of SITAR intrusion tolerance system
-
Fairfax, VA:, Oct
-
D. Wang, D. W. Bharat, B. Madan, and K. S. Trivedi, "Security analysis of SITAR intrusion tolerance system," in Proc. 2003 ACM Workshop on Survivable and Self-regenerative Systems. Fairfax, VA:, Oct. 2003, pp. 23-32.
-
(2003)
Proc. 2003 ACM Workshop on Survivable and Self-regenerative Systems
, pp. 23-32
-
-
Wang, D.1
Bharat, D.W.2
Madan, B.3
Trivedi, K.S.4
-
29
-
-
1642403770
-
Comparison of inter-area rekeying algorithms for secure wireless group communications
-
C. Zhang, B. DeCleene, J. Kurose, and D. Towsley, "Comparison of inter-area rekeying algorithms for secure wireless group communications," Performance Evaluation, vol. 49, no. 1/4, pp. 1-20, 2002.
-
(2002)
Performance Evaluation
, vol.49
, Issue.1-4
, pp. 1-20
-
-
Zhang, C.1
DeCleene, B.2
Kurose, J.3
Towsley, D.4
-
30
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y. A. Huang, "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, pp. 545-556, 2003.
-
(2003)
Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
31
-
-
19544370042
-
Energy efficient of large-scale wireless networks: Proactive versus reactive networking
-
May
-
Q. Zhao and L. Tong, "Energy efficient of large-scale wireless networks: Proactive versus reactive networking," IEEE Journal on Selected Areas in Communications, vol. 23, no. 5, pp. 1100-1112, May 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.5
, pp. 1100-1112
-
-
Zhao, Q.1
Tong, L.2
|