-
3
-
-
0036804084
-
Defending Against Flooding-based Distributed Denial of Service Attacks: A Tutorial
-
Chang, R. (2004) Defending Against Flooding-based Distributed Denial of Service Attacks: A Tutorial. IEEE Communications Magazine: 42-51
-
(2004)
IEEE Communications Magazine
, pp. 42-51
-
-
Chang, R.1
-
4
-
-
8344262333
-
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
-
Du, W., Deng, J., Han, Y., Chen, S., and Varshney, P. (2004) A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of IEEE INFOCOM
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
6
-
-
84978422134
-
Fine-grained Network Time Synchronization using Reference Broadcasts
-
Elson, J., Girod, L., and Estrin, D. (2002) Fine-grained Network Time Synchronization using Reference Broadcasts. ACM SIGOPS Operating Systems Review 36: 147-163
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, pp. 147-163
-
-
Elson, J.1
Girod, L.2
Estrin, D.3
-
8
-
-
25844493197
-
A Beacon-less Location Discovery Scheme forWireless Sensor Networks
-
Fang, L., Du,W., and Ning, P. (2005) A Beacon-less Location Discovery Scheme forWireless Sensor Networks. In Proceedings of IEEE INFOCOM
-
(2005)
Proceedings of IEEE INFOCOM
-
-
Fang, L.1
Du, W.2
Ning, P.3
-
11
-
-
78650323138
-
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
-
Jalili, R., Imani-Mehr, F., Amini, M., and Shahriari, H. (2005) Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks. In Proceedings of First Information Security Practice and Experience Conference
-
(2005)
Proceedings of First Information Security Practice and Experience Conference
-
-
Jalili, R.1
Imani-Mehr, F.2
Amini, M.3
Shahriari, H.4
-
15
-
-
33745327082
-
-
Knowledge-Based Intelligent Information and Engineering Systems
-
Kim, H., Kim, S., Lee, S., and Son, B. (2005) Estimation of the Optimal Number of Cluster-Heads in Sensor Network. Knowledge-Based Intelligent Information and Engineering Systems: 87-94
-
(2005)
Estimation of the Optimal Number of Cluster-Heads in Sensor Network
, pp. 87-94
-
-
Kim, H.1
Kim, S.2
Lee, S.3
Son, B.4
-
17
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and defenses
-
Newsome, J., Shi, E., Song, D., and Perrig, A. (2004) The Sybil Attack in Sensor Networks: Analysis and defenses. In Proceedings of IEEE Conference on Informantion Processing in Sensor Networks (IPSN'04)
-
(2004)
Proceedings of IEEE Conference on Informantion Processing in Sensor Networks (IPSN'04)
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
24
-
-
32244436344
-
An anomaly intrusion detection system based on vector quantization
-
DOI 10.1093/ietisy/e89-d.1.201
-
Zheng, J., and Hu, M. (2006) An Anomaly Intrusion Detection System Based On Vector Quantization. IEICE Transactions on Information and Systems (2006): 201-210 (Pubitemid 43214318)
-
(2006)
IEICE Transactions on Information and Systems
, vol.E89-D
, Issue.1
, pp. 201-230
-
-
Zheng, J.1
Hu, M.2
|