-
1
-
-
77952383630
-
-
OMNeT++ homepage.
-
OMNeT++ homepage. http://www.omnetpp.org/.
-
-
-
-
4
-
-
4544298056
-
Intrusion tolerance and anti-tra-c analysis strategies for wireless sensor networks
-
Washington, DC, USA, 2004. IEEE Computer Society
-
J. Deng, R. Han, and S. Mishra. Intrusion tolerance and anti-tra-c analysis strategies for wireless sensor networks. In DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, page 637, Washington, DC, USA, 2004. IEEE Computer Society.
-
DSN ' 04: Proceedings of the 2004 International Conference on Dependable Systems and Networks
, pp. 637
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
33847297141
-
Countermeasures against tra-c analysis attacks in wireless sensor networks
-
Washington, DC, USA. IEEE Computer Society
-
J. Deng, R. Han, and S. Mishra. Countermeasures against tra-c analysis attacks in wireless sensor networks. In SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pages 113{126, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SECURECOMM ' 05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
6
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.227, 4215809, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang. Protecting receiver-location privacy in wireless sensor networks. In INFOCOM'07: 26th IEEE International Conference on Computer Communications, pages 1955{1963, 2007. (Pubitemid 47334427)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
7
-
-
0036949534
-
Energy-E-cient Computing for Wildlife Tracking: Design and Tradeo s and Early Experiences with Zebranet
-
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein. Energy-E-cient Computing for Wildlife Tracking: Design and Tradeo s and Early Experiences with Zebranet. In Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 96{107, 2002.
-
(2002)
Proceedings of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 96-107
-
-
Juang, P.1
Oki, H.2
Wang, Y.3
Martonosi, M.4
Peh, L.5
Rubenstein, D.6
-
8
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Washington, DC, USA. IEEE Computer Society
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In ICDCS '05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pages 599{608, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ICDCS ' 05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
11
-
-
0038703640
-
DV based positioning in ad hoc networks
-
D. Nicelescu and B. Nath. DV based positioning in ad hoc networks. Telecommunication Systems, 22(1-4):267{280, 2003.
-
(2003)
Telecommunication Systems
, vol.22
, Issue.1-4
, pp. 267-280
-
-
Nicelescu, D.1
Nath, B.2
-
12
-
-
70249120775
-
Source location privacy against laptop-class attacks in sensor networks
-
New York, NY, USA. ACM
-
Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon. Source location privacy against laptop-class attacks in sensor networks. In SecureComm '08: Proceedings of the 4th international conference on Security and privacy in communication netowrks, pages 1{10, New York, NY, USA, 2008. ACM.
-
(2008)
SecureComm' 08: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks
, pp. 1-10
-
-
Ouyang, Y.1
Le, Z.2
Liu, D.3
Ford, J.4
Makedon, F.5
-
13
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In INFOCOM'08: 27th IEEE International Conference on Computer Communications, pages 51-55, 2008.
-
(2008)
INFOCOM'08: 27th IEEE International Conference on Computer Communications
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
16
-
-
33747624071
-
Integrated coverage and connectivity con guration for energy conservation in sensor networks
-
G. Xing, X. Wang, Y. Zhang, C. L. R. Pless, and C. Gill. Integrated coverage and connectivity con guration for energy conservation in sensor networks. ACM Trans. Sen. Netw., 1(1):36-72, 2005.
-
(2005)
ACM Trans. Sen. Netw.
, vol.1
, Issue.1
, pp. 36-72
-
-
Xing, G.1
Wang, X.2
Zhang, Y.3
Pless, C.L.R.4
Gill, C.5
-
17
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 46-57, 2005.
-
(2005)
MobiHoc' 05: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 4657
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
18
-
-
56749163645
-
Towards event source unobservability with minimum network tra-c in sensor networks
-
New York, NY, USA
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network tra-c in sensor networks. In WiSec '08: Proceedings of the rst ACM conference on Wireless network security, pages 77-88, New York, NY, USA, 2008. ACM.
-
(2008)
WiSec' 08: Proceedings of the Rst ACM Conference on Wireless Network Security
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
20
-
-
20344378689
-
Analyzing the transitional region in low power wireless links
-
M. Zuniga and B. Krishnamachari. Analyzing the transitional region in low power wireless links. In SECON'04: Proceedings of, pages 517-526, 2004.
-
(2004)
SECON'04: Proceedings of
, pp. 517-526
-
-
Zuniga, M.1
Krishnamachari, B.2
|