-
1
-
-
34548043694
-
Trust-based security for wireless Ad Hoc and sensor networks
-
A. Boukerch, L. Xu and K. EL-Khatib, Trust-based Security for Wireless Ad Hoc and Sensor Networks, Comput Commun 30 (2007), 2413-2427.
-
(2007)
Comput Commun
, vol.30
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
2
-
-
24644507953
-
On the security of cluster-based communication protocols for wireless sensor networks
-
Apr 17-21 Lecture Notes in Computer Science, Springer Verlag, Heidelberg, D-69121, Germany, 2005
-
A.C. Ferreira, M.A. Vilaca, L.B. Oliveira, E. Habib, H.C. Wong and A.A. Loureiro, On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks, in: Networking-ICN2005, Apr 17-21 2005, vol.3420ofLecture Notes in Computer Science, Springer Verlag, Heidelberg, D-69121, Germany, 2005, pp. 449-458.
-
(2005)
Networking-ICN2005
, vol.3420
, pp. 449-458
-
-
Ferreira, A.C.1
Vilaca, M.A.2
Oliveira, L.B.3
Habib, E.4
Wong, H.C.5
Loureiro, A.A.6
-
3
-
-
0031932940
-
Self-organizing maps for outlier detection
-
A. Mufioz and J. Muruzabal, Self-Organizing Maps for Outlier Detection, Neurocomputing 18(1-3) (1998), 33-60.
-
(1998)
Neurocomputing
, vol.18
, Issue.1-3
, pp. 33-60
-
-
Mufioz, A.1
Muruzabal, J.2
-
4
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic and D. Wagner, Security in wireless sensor networks, Communications of the ACM 47(no.6) (2004), 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
7
-
-
75849150575
-
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
-
Springer
-
C. Wallenta, J. Kim, P.J. Bentley and S. Hailes, Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm, Applied Intelligence, Springer 32(1) (2010), 1-26.
-
(2010)
Applied Intelligence
, vol.32
, Issue.1
, pp. 1-26
-
-
Wallenta, C.1
Kim, J.2
Bentley, P.J.3
Hailes, S.4
-
9
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
D. Malan, M. Welsh and M. Smith, A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, IEEESECON (2004), 71-80.
-
(2004)
IEEESECON
, pp. 71-80
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
11
-
-
0030157012
-
Neural recognition of human pointing gestures in real images
-
Kluwer Academic Publishers
-
E. Littmann, A. Drees and H. Ritter, Neural Recognition of Human Pointing Gestures in Real Images, Neural Processing Letters (1996), 61-71, Kluwer Academic Publishers.
-
(1996)
Neural Processing Letters
, pp. 61-71
-
-
Littmann, E.1
Drees, A.2
Ritter, H.3
-
12
-
-
85071222392
-
-
Gcov tool, http://gcc.gnu.org/onlinedocs/gcc/Gcov.html.
-
Gcov Tool
-
-
-
13
-
-
77954546683
-
-
Gproftool, http://www.cs.utah.edu/dept/old/texinfo/as/gprof toc.html.
-
Gproftool
-
-
-
15
-
-
40649084778
-
On multidimensional scaling and the embedding of self-organising maps
-
H. Yin, On multidimensional scaling and the embedding of self-organising maps, Neural Networks 21(2-3) (2008), 160169.
-
(2008)
Neural Networks
, vol.21
, Issue.2-3
, pp. 160169
-
-
Yin, H.1
-
17
-
-
77954548310
-
-
Immune systems, http://uhaweb.hartford.edu/bugl/immune. htm.
-
Immune Systems
-
-
-
18
-
-
34547813675
-
Morphological neural networks and vision based simultaneous localization and mapping
-
I. Villaverde, M. Granaand A. d'Anjou, Morphological Neural Networks and Vision Based Simultaneous Localization and Mapping, Integrated Computer-Aided Engineering 14(No.4) (2007), 355-363.
-
(2007)
Integrated Computer-Aided Engineering
, vol.14
, Issue.4
, pp. 355-363
-
-
Villaverde, I.1
Granaand, M.2
D'Anjou, A.3
-
20
-
-
70849088893
-
Improving security for SCADA sensor networks with reputation systems and self-organizing maps
-
J.M. Moya, A. Araujo, Z. Bankovic, J.M. de Goyeneche, J.C. Vallejo, P. Malagon, D. Villanueva, D. Fraga, E. Romero and J. Blesa, Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors, Special issue 95: State-of-the-Art Sensors Technology in Spain.
-
Sensors Special Issue 95: State-of-the-Art Sensors Technology in Spain
-
-
Moya, J.M.1
Araujo, A.2
Bankovic, Z.3
De Goyeneche, J.M.4
Vallejo, J.C.5
Malagon, P.6
Villanueva, D.7
Fraga, D.8
Romero, E.9
Blesa, J.10
-
21
-
-
77954549760
-
A low power reconfigurable architecture for adaptable embedded systems
-
J.M. Moya, J. Rodriguez, J. Martin, J.C. Vallejo, P. Malagoon, A. Araujo, J.M. de Goyeneche, A. Rubio, E. Romero, D. Villanueva, O. Nieto-Taladriz and C.A. Lopez Barrio, A Low Power Reconfigurable Architecture for Adaptable Embedded Systems, in: Proceedings ofWRC (2009).
-
(2009)
Proceedings of WRC
-
-
Moya, J.M.1
Rodriguez, J.2
Martin, J.3
Vallejo, J.C.4
Malagoon, P.5
Araujo, A.6
De Goyeneche, J.M.7
Rubio, A.8
Romero, E.9
Villanueva, D.10
Nieto-Taladriz, O.11
Lopez Barrio, C.A.12
-
22
-
-
30244475453
-
A self-organizing neural network for robot motion planning
-
S. Gielen and B. Kappen, eds, Springer Berlin Heidelberg
-
J.M. Vleugels, J.N. Kok and M.H. Overmars, A self-organizing neural network for robot motion planning, in: ICANN 93 Art. Neural Networks Conf. Proc, S. Gielen and B. Kappen, eds, Springer Berlin Heidelberg, 1993, pp. 281-284.
-
(1993)
ICANN 93 Art. Neural Networks Conf. Proc
, pp. 281-284
-
-
Vleugels, J.M.1
Kok, J.N.2
Overmars, M.H.3
-
23
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proceedings of IPSN (2004), 259-268.
-
(2004)
Proceedings of IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
24
-
-
38949156579
-
Linear time computation of similari-ty for sequential data
-
K. Rieck and P. Laskov, Linear Time Computation ofSimilari-ty for Sequential Data, Journal of Machine Learning Research 9 (2008), 23-48.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
25
-
-
20344364947
-
Function approximation with continuous self-organizing maps using neighboring influence interpolation
-
Berlin, Germany, May
-
M. Aupetit, P. Couturier and P. Massote, Function Approximation with Continuous Self-Organizing Maps Using Neighboring Influence Interpolation, in: Proc. of Neural Computation (NC2000), Berlin, Germany, May 2000.
-
(2000)
Proc. of Neural Computation (NC2000)
-
-
Aupetit, M.1
Couturier, P.2
Massote, P.3
-
26
-
-
77954555423
-
-
Ns-2 Simulator, http://www.isi.edu/nsnam/ns/.
-
-
-
Simulator, N.1
-
27
-
-
50249147298
-
Rule-based dependency models for security protocol analysis
-
Q. Chen, S. Zhang and Y.P. Chen, Rule-based Dependency Models for Security Protocol Analysis, Integrated Computer- Aided Engineering 15(4) (2008), 369-380.
-
(2008)
Integrated Computer- Aided Engineering
, vol.15
, Issue.4
, pp. 369-380
-
-
Chen, Q.1
Zhang, S.2
Chen, Y.P.3
-
28
-
-
0004120587
-
-
Springer-Verlag Berlin
-
R. Rojas, Neural Networks, Springer-Verlag, Berlin, 1996.
-
(1996)
Neural Networks
-
-
Rojas, R.1
-
31
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
-
S. Ganeriwal, S. Capkun, C. Han and M.B. Srivastava, Secure time synchronization service for sensor networks, Proceedings of Workshop on Wireless Security (2005), 97-106. (Pubitemid 44447322)
-
(2005)
WiSe - Proceedings of the 2005 ACM Workshop on Wireless Security
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
32
-
-
34547597104
-
Improved spiking neural networks for eeg classification and epilepsy and seizure detection
-
S. Ghosh-Dastidar and H. Adeli, Improved Spiking Neural Networks for EEG Classification and Epilepsy and Seizure Detection, Integrated Computer-Aided Engineering 14(No.3) (2007), 187-212.
-
(2007)
Integrated Computer-Aided Engineering
, vol.14
, Issue.3
, pp. 187-212
-
-
Ghosh-Dastidar, S.1
Adeli, H.2
-
33
-
-
51349133681
-
Detecting selective forwarding attacks in wireless sensor networks using support vector machines
-
S. Kaplantzis, A. Shilton, N. Mani and Y.A. Sekercioglu, Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines, Proceedings of 2007 Intelligent Sensors, Sensor Networks and Informations Processing Conference (2007), 335-340.
-
Proceedings of 2007 Intelligent Sensors, Sensor Networks and Informations Processing Conference
, vol.2007
, pp. 335-340
-
-
Kaplantzis, S.1
Shilton, A.2
Mani, N.3
Sekercioglu, Y.A.4
-
34
-
-
77954599498
-
-
SOM Algorithm, http://www.ai-junkie.com/ann/som/som2. html.
-
SOM Algorithm
-
-
-
36
-
-
0002059002
-
Energy Functions for Self-organizing Maps
-
Elsevier, E. Oja and S. Kaski, eds
-
T. Heskes, Energy functions for self-organizing maps, in: Ko-honen Maps. Elsevier, E. Oja and S. Kaski, eds, 1999.
-
(1999)
Ko-honen Maps
-
-
Heskes, T.1
-
37
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, Y.S. Han, J. Deng and P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, Proceedings ofthe ACM Conference on Computer and Communications Security (2003), 42-51.
-
(2003)
Proceedings Ofthe ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Han, Y.S.2
Deng, J.3
Varshney, P.K.4
-
38
-
-
24944566827
-
Secure routing in sensor networks: Security problem analysis and countermeasures
-
of Lecture Notes in Computer Science, Springer Verlag, Heidelberg, D- 69121, Germany
-
Y. Mun and C. Shin, Secure routing in sensor networks: Security problem analysis and countermeasures, in: International Conference on Computational Science and Its Applications - ICCSA 2005, vol.3480 of Lecture Notes in Computer Science, Springer Verlag, Heidelberg, D- 69121, Germany (2005), 459-467.
-
(2005)
International Conference on Computational Science and Its Applications - ICCSA 2005
, vol.3480
, pp. 459-467
-
-
Mun, Y.1
Shin, C.2
-
39
-
-
77954556643
-
Anomaly detection in wireless sensor networks using re-configurable SORU processor and self-organizing maps
-
Z. Bankovic, J.M. Moya, A. Araujo and J.M. de Goyeneche, Anomaly Detection in Wireless Sensor Networks using Re-configurable SORU Processor and Self-Organizing Maps, Proceedings ofJCRA, (2009).
-
(2009)
Proceedings of JCRA
-
-
Bankovic, Z.1
Moya, J.M.2
Araujo, A.3
De Goyeneche, J.M.4
-
40
-
-
50949089755
-
A framework of machine learning based intrusion detection for wireless sensor networks
-
Z. Yu and J. Tsai, A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks, Proceedings of SUTC (2008), 272-279.
-
(2008)
Proceedings of SUTC
, pp. 272-279
-
-
Yu, Z.1
Tsai, J.2
|