-
1
-
-
78751558075
-
-
access: Juny 12, 2010
-
Z. Alliance, "In http://www.zigbee.org [access: Juny 12, 2010]."
-
-
-
-
3
-
-
0003482564
-
-
Norwood, MA, USA: Artech House, Inc.
-
S. Katzenbeisser and F. A. Petitcolas, eds., Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA, USA: Artech House, Inc., 2000.
-
(2000)
Information Hiding Techniques for Steganography and Digital Watermarking
-
-
Katzenbeisser, S.1
Petitcolas, F.A.2
-
4
-
-
0004026002
-
-
San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
-
I. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2002.
-
(2002)
Digital Watermarking
-
-
Cox, I.1
Miller, M.L.2
Bloom, J.A.3
-
5
-
-
33746069919
-
Hiding data in the osi network model
-
Springer-Verlag
-
T. G. Handel and M. T. Sandford, II, "Hiding data in the osi network model," in Proceedings of the First International Workshop on Information Hiding, (London, UK), pp. 23-38, Springer-Verlag, 1996.
-
(1996)
Proceedings of the First International Workshop on Information Hiding, (London, UK)
, pp. 23-38
-
-
Handel, T.G.1
Sandford II, M.T.2
-
6
-
-
34848819708
-
A novel covert channel based on the ip header record route option
-
Z. Trabelsi, H. El Sayed, L. Frikha, and T. Rabie, "A novel covert channel based on the ip header record route option," Int. J. Adv. Media Commun., vol. 1, no. 4, pp. 328-350, 2007.
-
(2007)
Int. J. Adv. Media Commun.
, vol.1
, Issue.4
, pp. 328-350
-
-
Trabelsi, Z.1
El Sayed, H.2
Frikha, L.3
Rabie, T.4
-
7
-
-
33746584368
-
Embedding covert channels into tcp/ip
-
Information Hiding: 7th International Workshop
-
S. J. Murdoch and S. Lewis, "Embedding covert channels into tcp/ip," in Information Hiding: 7th International Workshop, volume 3727 of LNCS, pp. 247-261, 2005.
-
(2005)
LNCS
, vol.3727
, pp. 247-261
-
-
Murdoch, S.J.1
Lewis, S.2
-
8
-
-
78751555303
-
A performance analysis of hiccups - A steganographic system for wlan
-
vol. abs/0906.4217
-
K. Szczypiorski, "A performance analysis of hiccups - a steganographic system for wlan," CoRR, vol. abs/0906.4217, 2009.
-
(2009)
CoRR
-
-
Szczypiorski, K.1
-
9
-
-
78751491234
-
Security in wireless sensor networks: Issues and challenges
-
vol. abs/0712.4169
-
A.-S. K. Pathan, H.-W. Lee, and C. S. Hong, "Security in wireless sensor networks: Issues and challenges," CoRR, vol. abs/0712.4169, 2007.
-
(2007)
CoRR
-
-
Pathan, A.-S.K.1
Lee, H.-W.2
Hong, C.S.3
-
10
-
-
67650556600
-
Steganography in 802.15.4 wireless communication
-
L. S. Mehta A.M. and P. K., "Steganography in 802.15.4 wireless communication," in Advanced Networks and Telecommunication Systems, 2008. ANTS '08. 2nd International Symposium on, (Mumbai), pp. 1-3, 2008.
-
(2008)
Advanced Networks and Telecommunication Systems, 2008. ANTS '08. 2nd International Symposium On, (Mumbai)
, pp. 1-3
-
-
Mehta, L.S.1
M, A.2
K, P.3
-
12
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: A survey," IEEE Communications Surveys and Tutorials, vol. 10, no. 1-4, pp. 6-28, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.1-4
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
15
-
-
84866507867
-
Avroraz: Extending avrora with an ieee 802.15.4 compliant radio chip model
-
ACM
-
R. de Paz Alberola and D. Pesch, "Avroraz: extending avrora with an ieee 802.15.4 compliant radio chip model," in PM2HW2N '08: Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, (New York, NY, USA), pp. 43-50, ACM, 2008.
-
(2008)
PM2HW2N '08: Proceedings of the 3nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, (New York, NY, USA)
, pp. 43-50
-
-
De Paz Alberola, R.1
Pesch, D.2
-
16
-
-
33744909363
-
Avrora: Scalable sensor network simulation with precise timing
-
IEEE Press
-
B. L. Titzer, D. K. Lee, and J. Palsberg, "Avrora: scalable sensor network simulation with precise timing," in IPSN '05: Proceedings of the 4th international symposium on Information processing in sensor networks, (Piscataway, NJ, USA), p. 67, IEEE Press, 2005.
-
(2005)
IPSN '05: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, (Piscataway, NJ, USA)
, pp. 67
-
-
Titzer, B.L.1
Lee, D.K.2
Palsberg, J.3
-
17
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
J. A. Stankovic, A. Arora, and R. Govindan, eds., ACM
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks.," in SenSys (J. A. Stankovic, A. Arora, and R. Govindan, eds.), pp. 162-175, ACM, 2004.
-
(2004)
SenSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
18
-
-
33749041485
-
Applying intrusion detection systems to wireless sensor networks
-
3rd IEEE, January
-
L. J. Roman R., Jianying Zhou, "Applying intrusion detection systems to wireless sensor networks," in Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE, pp. 640-644, January 2006.
-
(2006)
Consumer Communications and Networking Conference, 2006. CCNC 2006
, pp. 640-644
-
-
Roman R., L.J.1
Zhou, J.2
-
19
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
|