-
1
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof, and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " AdHoc Networks Journal, Vol. 1, No. 23, pp. 293-315, September 2003.
-
(2003)
AdHoc Networks Journal
, vol.1
, Issue.23
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
3
-
-
70349686596
-
A Chain reaction DoS attack on 3G networks: Analysis and defenses
-
April
-
B. Zhao, C. Chi, W. Gao, S. Zhu, and G. Cao, "A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses, " in Proc. of IEEE INFOCOM, April 2009.
-
(2009)
Proc. of IEEE INFOCOM
-
-
Zhao, B.1
Chi, C.2
Gao, W.3
Zhu, S.4
Cao, G.5
-
4
-
-
35148897382
-
Detecting compromised nodes in wireless sensor networks
-
Jul
-
M. Mathews, Min Song, S. Shetty, and R. McKenzie, "Detecting Compromised Nodes in Wireless Sensor Networks, " in Proc. of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Jul 2007.
-
(2007)
Proc. of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
-
-
Mathews, M.1
Song, M.2
Shetty, S.3
Mckenzie, R.4
-
6
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Aug.
-
I. Onat, and I. A. Miri, "An Intrusion Detection System for Wireless Sensor Networks, " in Proc. of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 253-259, Aug 2005.
-
(2005)
Proc. of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 253-259
-
-
Onat, I.1
Miri, I.A.2
-
7
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
Edith C. H. Ngai, Jiangchuan Liu, and Michael R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks, " in Proc. of IEEE ICC, pp. 3383-3389, 2006.
-
(2006)
Proc. of IEEE ICC
, pp. 3383-3389
-
-
Ngai, E.C.H.1
Liu, J.2
Lyu, M.R.3
-
8
-
-
51849144220
-
Compromised sensor nodes detection: A quantitative approach
-
June
-
T. Li, M. Song, and M. Alam, "Compromised Sensor Nodes Detection: A Quantitative Approach, " in Proc. of the 1st International Workshop on Wireless Security and Privacy, pp. 352-357, June 2008.
-
(2008)
Proc. of the 1st International Workshop on Wireless Security and Privacy
, pp. 352-357
-
-
Li, T.1
Song, M.2
Alam, M.3
-
9
-
-
36849024896
-
Sensor node compromise detection: The location perspective
-
H. Song, L. Xie, S. Zhu, and G. Cao, "Sensor Node Compromise Detection: The Location Perspective", in Proc. of the 2007 International Conference on Wireless Communications and Mobile Computing, pp. 242-247, 2007.
-
(2007)
Proc. of the 2007 International Conference on Wireless Communications and Mobile Computing
, pp. 242-247
-
-
Song, H.1
Xie, L.2
Zhu, S.3
Cao, G.4
-
10
-
-
41549167232
-
A framework for identifying compromised nodes in sensor networks
-
Article number 12, March
-
Q. Zhang, T. Yu, and P. Ning, "A Framework for Identifying Compromised Nodes in Sensor Networks, " ACM Transactions on Information and System Security, Vol. 11, No. 3, Article number 12, March 2008.
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.3
-
-
Zhang, Q.1
Yu, T.2
Ning, P.3
-
11
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Springer, Article number 12, February
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, "Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks, " Algorithmic Aspects of Wireless Sensor Networks, Lecture Notes in Computer Science, Springer, Vol. 4837, pp. 150-161, Article number 12, February 2008.
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks, Lecture Notes in Computer Science
, vol.4837
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
12
-
-
34547461705
-
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
-
M. Kefayati, H. R. Rabiee, S. G. Miremadi, and A. Khonsari, "Misbehavior resilient multi-path data transmission in mobile ad-hoc networks, " in Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 91-100, 2006.
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 91-100
-
-
Kefayati, M.1
Rabiee, H.R.2
Miremadi, S.G.3
Khonsari, A.4
|