-
1
-
-
34548314598
-
Optimal jamming attacks and defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal Jamming Attacks and Defense Policies in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
2
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
-
M. Raya, J.-P. Hubaux, and I. Aad, "DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots," Proc. Second Int'l Conf. Mobile Systems, Applications and Services (MobiSys '04), 2004.
-
(2004)
Proc. Second Int'l Conf. Mobile Systems, Applications and Services (MobiSys '04)
-
-
Raya, M.1
Hubaux, J.-P.2
Aad, I.3
-
3
-
-
85008044268
-
Selfish MAC layer misbehavior in wireless networks
-
Sept./Oct.
-
P. Kyasanur and N. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, vol.4, no.5, pp. 502-516, Sept./Oct. 2005.
-
(2005)
IEEE Trans. Mobile Computing
, vol.4
, Issue.5
, pp. 502-516
-
-
Kyasanur, P.1
Vaidya, N.2
-
5
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks," Computer, vol.35, no.10, pp. 54-62, Oct. 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
7
-
-
0034250315
-
Analysis of an on-off jamming situation as a dynamic game
-
Aug.
-
R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an On-Off Jamming Situation as a Dynamic Game," IEEE Trans. Comm., vol.48, no.8, pp. 1360-1373, Aug. 2000.
-
(2000)
IEEE Trans. Comm.
, vol.48
, Issue.8
, pp. 1360-1373
-
-
Mallik, R.1
Scholtz, R.2
Papavassilopoulos, G.3
-
8
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A.W. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
9
-
-
33746342121
-
Quarantine region scheme to mitigate spam attacks in wireless sensor networks
-
Aug.
-
V. Coskun, E. Cayirci, A. Levi, and S. Sancak, "Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol.5, no.8, pp. 1074-1086, Aug. 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.8
, pp. 1074-1086
-
-
Coskun, V.1
Cayirci, E.2
Levi, A.3
Sancak, S.4
-
10
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Feb.
-
Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-Efficient Link-Layer Jamming Attacks Against Wireless Sensor Network MAC Protocols," ACM Trans. Sensor Networks, vol.5, no.1, pp. 1-38, Feb. 2009.
-
(2009)
ACM Trans. Sensor Networks
, vol.5
, Issue.1
, pp. 1-38
-
-
Law, Y.W.1
Van Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
11
-
-
18844450713
-
On link-layer denial of service in data wireless LANs
-
May
-
G. Lin and G. Noubir, "On Link-Layer Denial of Service in Data Wireless LANs," Wiley J. Wireless Comm. and Mobile Computing, vol.5, no.3, pp. 273-284, May 2005.
-
(2005)
Wiley J. Wireless Comm. and Mobile Computing
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
12
-
-
33845635202
-
Wormhole-based antijamming techniques in sensor networks
-
Jan.
-
M. Cagalj, S. Capkun, and J.-P. Hubaux, "Wormhole-Based AntiJamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol.6, no.1, pp. 1-15, Jan. 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.1
, pp. 1-15
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
13
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
14
-
-
35348897340
-
Channel surfing: Defending wireless sensor networks from interference
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing: Defending Wireless Sensor Networks from Interference," Proc. IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN), 2007.
-
(2007)
Proc. IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN)
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
15
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter, "Detection of Denial-of-Message Attacks on Sensor Network Broadcasts," Proc. IEEE Symp. Security and Privacy, 2005.
-
(2005)
Proc. IEEE Symp. Security and Privacy
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
-
19
-
-
0033349954
-
Multi-hypothesis sequential probability ratio tests\part i: Asymptotic optimality
-
Nov.
-
V.P. Dragalin, A.G. Tartakovsky, and V.V. Veeravalli, "Multi-hypothesis Sequential Probability Ratio Tests\Part I: Asymptotic Optimality," IEEE Trans. Information Theory, vol.45, no.7, pp. 2448-2461, Nov. 1999.
-
(1999)
IEEE Trans. Information Theory
, vol.45
, Issue.7
, pp. 2448-2461
-
-
Dragalin, V.P.1
Tartakovsky, A.G.2
Veeravalli, V.V.3
|