-
1
-
-
33745727952
-
Security Framework for Wireless Sensor Networks
-
DOI: 10.1007/s 11277-006-9044-7
-
Neeli R. Prasad and Mabubul Alam, Security Framework for Wireless Sensor Networks, Wireless Personal Communications (2006)37:455-469, DOI: 10.1007/s 11277-006-9044-7.
-
(2006)
Wireless Personal Communications
, vol.37
, pp. 455-469
-
-
Prasad, N.R.1
Alam, M.2
-
2
-
-
70249102120
-
Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
-
Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su, Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation, The Symposium on Simulation of Systems Security (SSSS'08), Ottawa, Canada, April 14-17, 2008.
-
The Symposium on Simulation of Systems Security (SSSS'08), Ottawa, Canada, April 14-17, 2008
-
-
Atakli, I.M.1
Hu, H.2
Chen, Y.3
Ku, W.-S.4
Su, Z.5
-
4
-
-
78751700831
-
Secure Data Aggregation in Wireless Sensor Network: A survey
-
H. Alzaid, E. Foo and J. G .Nieto, Secure Data Aggregation in Wireless Sensor Network: A survey,in 6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008.
-
6th Australasian Information Security Conference, ACSC2008, Wollongong, Australia, January 2008
-
-
Alzaid, H.1
Foo, E.2
Nieto, J.G.3
-
5
-
-
77953852618
-
-
CoNEXT, Lisboa, Portugal
-
B. Parno, E. Gaustad, M. Luk and A. Perrig, Secure Sensor Network Routing: A Clean-Slate Approach, CoNEXT 2006, Lisboa, Portugal.
-
(2006)
Secure Sensor Network Routing: A Clean-Slate Approach
-
-
Parno, B.1
Gaustad, E.2
Luk, M.3
Perrig, A.4
-
7
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
Elsevier
-
KC. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,Journal of Ad Hoc Networks, Elsevier, 2003.
-
(2003)
Journal of Ad Hoc Networks
-
-
Karlof, K.C.1
Wagner, D.2
-
8
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defense
-
J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis and Defense,International Symposium on Information Processing in Sensor Networks, Vol. 1, 2004.
-
(2004)
International Symposium on Information Processing in Sensor Networks
, vol.1
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
10
-
-
33746313270
-
LAD: Localization Anomaly Detection for Wireless Sensor Networks
-
W. Du, L. Fang, and P. Ning, LAD: Localization Anomaly Detection for Wireless Sensor Networks, the 19th International Parallel and Distributed Priocessing Symposium (IPDPS'05),Denver, Colorado, USA, April 3-8, 2005.
-
19th International Parallel and Distributed Priocessing Symposium (IPDPS'05),Denver, Colorado, USA, April 3-8, 2005
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
11
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
ISBN: 0-7695-2132-0
-
W.R.Pires Jr., T.H.P. Figueiredo, H.C.Wong and A.A.F.Loureiro, Malicious node detection in wireless sensor networks, in Proceedings of the 8th International Parallel and Distributed Processing Symposium (IPDPS'04), Santa Fe, NM, USA. ISBN: 0-7695-2132-0.
-
Proceedings of the 8th International Parallel and Distributed Processing Symposium (IPDPS'04), Santa Fe, NM, USA
-
-
Pires Jr., W.R.1
Figueiredo, T.H.P.2
Wong, H.C.3
Loureiro, A.A.F.4
-
13
-
-
84976699318
-
The Byzantine Generals Problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, Vol. 4, No. 3, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
15
-
-
0034546898
-
Intrusion Detection in Wireless Ad-Hoc Networks
-
Y.Zhang and W.Lee, Intrusion Detection in Wireless Ad-Hoc Networks, in Proc. ACM MobiCom, pages 275-283, 2000.
-
(2000)
Proc. ACM MobiCom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
|