-
1
-
-
39349109631
-
Inherent security of routing protocols in ad-hoc and sensor networks
-
2007
-
T. Roosta, S. Pai, P. Chen, S. Sastry, and S. Wicker, "Inherent security of routing protocols in ad-hoc and sensor networks," in GLOBECOM '07: Global Telecommunications Conference, 2007, pp. 1273-1278, 2007.
-
(2007)
GLOBECOM '07: Global Telecommunications Conference
, pp. 1273-1278
-
-
Roosta, T.1
Pai, S.2
Chen, P.3
Sastry, S.4
Wicker, S.5
-
2
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
3
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
ACM
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, 'The feasibility of launching and detecting jamming attacks in wireless networks," in MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46-57, ACM, 2005.
-
(2005)
MobiHoc '05: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
4
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255-265, ACM, 2000.
-
(2000)
MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
5
-
-
0034445661
-
System, architecture directions for networked, sensors
-
ACM
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System, architecture directions for networked, sensors," in ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pp. 93-104, ACM, 2000.
-
(2000)
ASPLOS-IX: Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
6
-
-
51349133681
-
Detecting selective forwarding attacks in wireless sensor networks using support vector machines
-
S. Kaplantzis, A. Shilton, N. Mani, and Y. Sekercioglu, "Detecting selective forwarding attacks in wireless sensor networks using support vector machines," in ISSNIP '07: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 335-340, 2007.
-
(2007)
ISSNIP '07: 3rd International Conference on Intelligent Sensors, Sensor Networks and Information
, pp. 335-340
-
-
Kaplantzis, S.1
Shilton, A.2
Mani, N.3
Sekercioglu, Y.4
-
7
-
-
32144435943
-
Decentralized, intrusion detection in wireless sensor networks
-
ACM
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized, intrusion detection in wireless sensor networks," in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 16-23, ACM, 2005.
-
(2005)
Q2SWinet '05: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
8
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," in WiMob '05: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, vol. 3, pp. 253-259, 2005.
-
(2005)
WiMob '05: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, vol.3
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
9
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in INFOCOM '07: 26th IEEE International Conference on Computer Communications, pp. 1937-1945, 2007.
-
(2007)
INFOCOM '07: 26th IEEE International Conference on Computer Communications
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
10
-
-
56949096891
-
Group-based intrusion detection system, in wireless sensor networks
-
G. Li, J. He, and Y. Fu, "Group-based intrusion detection system, in wireless sensor networks," Computer Communications, vol. 31, no. 18, pp. 4324-4332, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4324-4332
-
-
Li, G.1
He, J.2
Fu, Y.3
-
13
-
-
33749041485
-
Applying intrusion detection systems to wireless sensor networks
-
R. Roman, J. Zhou, and J. Lopez, "Applying intrusion detection systems to wireless sensor networks," in CCNC '06: 3rd IEEE Consumer Communications and Networking Conference, vol. 1, pp. 640-644, 2006.
-
(2006)
CCNC '06: 3rd IEEE Consumer Communications and Networking Conference
, vol.1
, pp. 640-644
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
14
-
-
0019613747
-
Software structure metrics based on information flow
-
S. Henry and K. Kafura, "Software structure metrics based on information flow," IEEE Transactions on Software Engineering, vol. 7(5), pp. 510-518, 1981.
-
(1981)
IEEE Transactions on Software Engineering
, vol.7
, Issue.5
, pp. 510-518
-
-
Henry, S.1
Kafura, K.2
|