-
1
-
-
70349966852
-
Performance analysis of various routing strategies in mobile ad hoc network using QualNet simulator
-
Nov. 12-13, IEEE Xplore Press, Islamabad. DOI: 10.1109/ICET.2007.4516317
-
Ahmed, S., M. Bhilal, U. Farooq and Fazl-e-Hadi, 2007. Performance analysis of various routing strategies in mobile ad hoc network using QualNet simulator. Proceeding of the IEEE International Conference on Emerging Technologies, Nov. 12-13, IEEE Xplore Press, Islamabad, pp: 62-67. DOI: 10.1109/ICET.2007.4516317
-
(2007)
Proceeding of the IEEE International Conference on Emerging Technologies
, pp. 62-67
-
-
Ahmed, S.1
Bhilal, M.2
Farooq, U.3
Fazl-e-Hadi4
-
2
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Bhuse, V. and A. Gupta, 2006. Anomaly intrusion detection in wireless sensor networks. J. High Speed Networks, 15: 33-51. http://portal.acm.org/citation.cfm?id=1140567
-
(2006)
J. High Speed Networks
, vol.15
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
3
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
Oct. 13-13, ACM Press, Montreal, Quebec, Canada. DOI: 10.1145/1089761.1089765
-
Da Silva, A.P.R., M.T.H. Martins, B.P.S. Rocha, A.A.F. Loureiro and L.B. Ruiz et al., 2005. Decentralized intrusion detection in wireless sensor networks. Proceeding of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, Oct. 13-13, ACM Press, Montreal, Quebec, Canada, pp: 16-23. DOI: 10.1145/1089761.1089765
-
(2005)
Proceeding of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.T.H.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
-
4
-
-
38349178199
-
Security and privacy for implantable medical devices
-
DOI: 10.1109/MPRV.2008.16
-
Halperin. D., T. Kohno, T.S. Heydt-Benjamin, K. Fu and W.H. Maisel, 2008. Security and privacy for implantable medical devices. IEEE J. Perv. Comput., 7: 30-39. DOI: 10.1109/MPRV.2008.16
-
(2008)
IEEE J. Perv. Comput.
, vol.7
, pp. 30-39
-
-
Halperin, D.1
Kohno, T.2
Heydt-Benjamin, T.S.3
Fu, K.4
Maisel, W.H.5
-
5
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI: 10.1016/S1570-8705(03)00008-8
-
Karlof, C. and D. Wagner, 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1: 293-315. DOI: 10.1016/S1570-8705(03)00008-8
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
6
-
-
72449131513
-
From feature selection to building of Bayesian classifiers: A network intrusion detection perspective
-
DOI: 10.3844/.2009.1948.1959
-
Khor, K.C., C.Y. Ting and S.P. Amnuaisuk, 2009. From feature selection to building of Bayesian classifiers: A network intrusion detection perspective. Am. J. Applied Sci., 6: 1949-1960. DOI: 10.3844/.2009.1948.1959
-
(2009)
Am. J. Applied Sci.
, vol.6
, pp. 1949-1960
-
-
Khor, K.C.1
Ting, C.Y.2
Amnuaisuk, S.P.3
-
8
-
-
63149087345
-
Efficient distributed security for wireless medical sensor networks
-
Dec. 15-18, IEEE Xplore Press, Sydney, NSW. DOI: 10.1109/ISSNIP.2008.4761995
-
Morchon, O.G. and H. Baldus, 2008. Efficient distributed security for wireless medical sensor networks. Proceeding of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Dec. 15-18, IEEE Xplore Press, Sydney, NSW, pp: 249-254. DOI: 10.1109/ISSNIP.2008.4761995
-
(2008)
Proceeding of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing
, pp. 249-254
-
-
Morchon, O.G.1
Baldus, H.2
-
9
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Aug. 22-24, IEEE Xplore Press, USA., DOI: 10.1109/WIMOB.2005.1512911
-
Onat, I. and A. Miri, 2005. An intrusion detection system for wireless sensor networks. Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Aug. 22-24, IEEE Xplore Press, USA., pp: 253-259. DOI: 10.1109/WIMOB.2005.1512911
-
(2005)
Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
10
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
DOI: 10.1023/A:1016598314198
-
Perrig, A., R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler, 2002. SPINS: Security protocols for sensor networks. Wireless Networks, 8: 521-534. DOI: 10.1023/A:1016598314198
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
11
-
-
78049511775
-
ICT based Sustainable rural business opportunities in developing countries: A wireless-networked RCP-RAP approach
-
DOI: 10.3844/.2005.1256.1260
-
Rahman, M.A., M.U. Mahfuz, K.M. Ahmed and R.M.A.P. Rajatheva, 2005. ICT based Sustainable rural business opportunities in developing countries: A wireless-networked RCP-RAP approach. Am. J. Applied Sci., 2: 1256-1260. DOI: 10.3844/.2005.1256.1260
-
(2005)
Am. J. Applied Sci.
, vol.2
, pp. 1256-1260
-
-
Rahman, M.A.1
Mahfuz, M.U.2
Ahmed, K.M.3
Rajatheva, R.M.A.P.4
-
12
-
-
41149142346
-
A dynamic resource synchronizer mutual exclusion algorithm for wired/wireless distributed systems
-
DOI: 10.3844/.2008.829.834
-
Sharieh, A., M. Itriq and W. Dbabat, 2008. A dynamic resource synchronizer mutual exclusion algorithm for wired/wireless distributed systems. Am. J. Applied Sci., 5: 829-834. DOI: 10.3844/.2008.829.834
-
(2008)
Am. J. Applied Sci.
, vol.5
, pp. 829-834
-
-
Sharieh, A.1
Itriq, M.2
Dbabat, W.3
|