-
1
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 197-213.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
2
-
-
26844466923
-
Large deviations of Markov chains indexed by random trees
-
DEMBO, A., M0RTERS, P., AND SHEFFIELD, S. 2005. Large deviations of Markov chains indexed by random trees. Ann. I. H. Poincaré PR-41, 971-996.
-
(2005)
Ann. I. H. Poincaré
, vol.PR-41
, pp. 971-996
-
-
Dembo, A.1
Morters, P.2
Sheffield, S.3
-
4
-
-
77956598774
-
-
FRIESZ, P. J. AND COLMAN, J. A. 2001. Hydrology and trophic ecology of Walden Pond, Concord, Massachusetts: U.S. geological survey water-resources investigations report 01-4153.
-
(2001)
Hydrology and Trophic Ecology of Walden Pond, Concord, Massachusetts: U.S. Geological Survey Water-resources Investigations Report
, vol.1
, Issue.4153
-
-
Friesz, P.J.1
Colman, J.A.2
-
5
-
-
0001613029
-
Asymptotically optimal tests for multinomial distributions
-
HOEFFDING, W .1965. Asymptotically optimal tests for multinomial distributions. Ann. Math. Statist. 36, 369-401.
-
(1965)
Ann. Math. Statist.
, vol.36
, pp. 369-401
-
-
Hoeffding, W.1
-
6
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
HU, Y. C., PERRIG, A., AND JOHNSON, D, 2003. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the 22nd Conference of the IEEE Communications Society (INFOCOM). IEEE Computer Society Press, Los Alamitos, CA.
-
(2003)
Proceedings of the 22nd Conference of the IEEE Communications Society (INFOCOM)
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
7
-
-
24944466187
-
Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
-
IEEE Computer Society Press, Los Alamitos, CA
-
LAZOS, L., POOVENDRAN, R., MEADOWS, C., SYVERSON, P., AND CHANG, L. W. 2005. Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. In Proceedings of the IEEE Wireless Communications and Networking Conference. IEEE Computer Society Press, Los Alamitos, CA, 1193-1199.
-
(2005)
Proceedings of the IEEE Wireless Communications and Networking Conference
, pp. 1193-1199
-
-
Lazos, L.1
Poovendran, R.2
Meadows, C.3
Syverson, P.4
Chang, L.W.5
-
8
-
-
77956585329
-
Spatio-temporal network anomaly detection by assessing deviations of empirical measures
-
PASCHALIDIS, I. AND SMARAGDAKIS, S. 2008. Spatio-temporal network anomaly detection by assessing deviations of empirical measures. IEEE/ACM Trans. Network.
-
(2008)
IEEE/ACM Trans. Network
-
-
Paschalidis, I.1
Smaragdakis, S.2
-
9
-
-
73349139160
-
Robust and distributed stochastic localization in sensor networks: Theory and experimental results
-
PASCHALIDIS, I.C., AND GUO, D. 2008. Robust and distributed stochastic localization in sensor networks: Theory and experimental results. ACM Trans. Sensor Netw. 5, 4.
-
(2008)
ACM Trans. Sensor Netw.
, vol.5
, pp. 4
-
-
Paschalidis, I.C.1
Guo, D.2
-
10
-
-
4243082091
-
Security in wireless sensor networks
-
PERRIG, A., STANKOVIC, J., AND WAGNER, D. 2004. Security in wireless sensor networks. Comm. ACM 47, 6, 53-57.
-
(2004)
Comm. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
11
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
PERRIG, A., SZEWCZYK, R., WEN, V., CULLER, D., AND TYGAR, J. D. 2002. Spins: Security protocols for sensor networks. Wirel. Networks 5, 521-534.
-
(2002)
Wirel. Networks
, vol.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
12
-
-
33745122574
-
Statistical location detection with sensor networks
-
RAY, S., LAI, W., AND PASCHALIDIS, I. C. 2006. Statistical location detection with sensor networks. Joint special issue IEEE/ACM Trans. Network. IEEE Trans. Inform. Theory 52, 6, 2670-2683.
-
(2006)
Joint Special Issue IEEE/ACM Trans. Network. IEEE Trans. Inform. Theory
, vol.52
, Issue.6
, pp. 2670-2683
-
-
Ray, S.1
Lai, W.2
Paschalidis, I.C.3
-
13
-
-
35248830261
-
Online outlier detection in sensor data using non-parametric models
-
ACM, New York
-
SUBRAMANIAM, S., PALPANAS, T., PAPADOPOULOS, D., KALOGERAKI, V., AND GUNOPULOS, D. 2006. Online outlier detection in sensor data using non-parametric models. In Proceedings of the International Conference on Very Large Data Bases. ACM, New York, 187-198.
-
(2006)
Proceedings of the International Conference on Very Large Data Bases)
, pp. 187-198
-
-
Subramaniam, S.1
Palpanas, T.2
Papadopoulos, D.3
Kalogeraki, V.4
Gunopulos, D.5
-
14
-
-
0026913009
-
When is the generalized likelihood ratio test optimal? IEEE Trans
-
ZEITOUNI, O., ZIV, J., AND MERHAV, N. 1992. When is the generalized likelihood ratio test optimal? IEEE Trans. Inform. Theory 38, 5, 1597-1602.
-
(1992)
Inform. Theory
, vol.38
, Issue.5
, pp. 1597-1602
-
-
Zeitouni, O.1
Ziv, J.2
Merhav, N.3
-
15
-
-
33847120377
-
+: Efficient security mechanisms for large-scale distributed sensor networks
-
+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sensor Netw. 2, 4, 500-528.
-
(2006)
ACM Trans. Sensor Netw.
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|