-
1
-
-
33646518088
-
Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks
-
Mar., Article (CrossRef Link)
-
S. Hadim and N. Mohamed, "Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks, " IEEE Computer Society, vol. 7, no. 3, pp. 1-23, Mar. 2006. Article (CrossRef Link)
-
(2006)
IEEE Computer Society
, vol.7
, Issue.3
, pp. 1-23
-
-
Hadim, S.1
Mohamed, N.2
-
2
-
-
2942656255
-
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
Sep., Article (CrossRef Link)
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, Sep. 2003. Article (CrossRef Link)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
3
-
-
0036688074
-
A Survey on Sensor Networks
-
Aug., Article (CrossRef Link)
-
L. Akyyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks, " IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002. Article (CrossRef Link)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyyildiz, L.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
56949088196
-
A Survey of Security Issues in Wireless Sensor Networks
-
Article (CrossRef Link)
-
Y. Wang, G. Attebury and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks, " IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006. Article (CrossRef Link)
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
5
-
-
29844457889
-
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
-
in, Article (CrossRef Link)
-
W. Xu, W. Trappe, Y. Zhang and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, " in Proc. MobiHoc, pp. 46-57, 2005. Article (CrossRef Link)
-
(2005)
Proc. MobiHoc
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
6
-
-
38349154579
-
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
-
Article (CrossRef Link)
-
D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses, " Pervasive Computing, pp. 74-81, 2008. Article (CrossRef Link)
-
(2008)
Pervasive Computing
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
7
-
-
84978098257
-
Power Management Techniques for Mobile Communication
-
in, Article (CrossRef Link)
-
R. Kravets and P. Krishnan, "Power Management Techniques for Mobile Communication, " in Proc. IEEE MOBICOM, pp. 157-168, 1998. Article (CrossRef Link)
-
(1998)
Proc. IEEE MOBICOM
, pp. 157-168
-
-
Kravets, R.1
Krishnan, P.2
-
8
-
-
2642584004
-
Denial-of-Service Attacks on Battery-powered Mobile Computers
-
in, Article (CrossRef Link)
-
T. Martin, M. Hsiao, D. Ha and J. Krishnaswami, "Denial-of-Service Attacks on Battery-powered Mobile Computers, " in Proc. PerCom, pp. 309-318, 2004. Article (CrossRef Link)
-
(2004)
Proc. PerCom
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Ha, D.3
Krishnaswami, J.4
-
9
-
-
33845958392
-
Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols
-
in, Article (CrossRef Link)
-
D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, "Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols, " in Proc. Workshop on Information Assurance, pp. 297-304, 2006. Article (CrossRef Link)
-
(2006)
Proc. Workshop on Information Assurance
, pp. 297-304
-
-
Raymond, D.1
Marchany, R.2
Brownfield, M.3
Midkiff, S.4
-
10
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Article (CrossRef Link)
-
Anthony D. Wood and John A. Stankovic, "Denial of Service in Sensor Networks, " IEEE Computer Society Press, vol. 35, no. 10, pp. 48-56, 2002. Article (CrossRef Link)
-
(2002)
IEEE Computer Society Press
, vol.35
, Issue.10
, pp. 48-56
-
-
Wood, A.D.1
Stankovic, J.A.2
-
11
-
-
0030715989
-
Analysis of a Denial of Service Attack on TCP
-
in, Article (CrossRef Link)
-
C. L. Schuba, I. V. Krsul, M. g. Kuhn, E. H. Spafford, A. Sundaram and D. Zamboni, "Analysis of a Denial of Service Attack on TCP, " in Proc. IEEE Symposium on Security and Privacy, pp. 208-223, 1997. Article (CrossRef Link)
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
12
-
-
84949938425
-
DOS-Resistant Authentication with Client Puzzles
-
in, Article (CrossRef Link)
-
T. Aura, P. Nikander and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles, " in Proc. Security Protocols Workshop, pp. 170-177, 2000. Article (CrossRef Link)
-
(2000)
Proc. Security Protocols Workshop
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
14
-
-
70350554437
-
A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks
-
Jul, 23-25, Article (CrossRef Link)
-
S.K. Jain and K. Garg, "A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks, " Computational Intelligence, Communication Systems and Networks, 2009. CICSYN '09. First International Conference on, pp.102-107, Jul. 23-25, 2009. Article (CrossRef Link)
-
(2009)
Computational Intelligence, Communication Systems and Networks, 2009. CICSYN '09. First International Conference on
, pp. 102-107
-
-
Jain, S.K.1
Garg, K.2
-
15
-
-
85008056769
-
Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection
-
in, ACM Press, New York. Article (CrossRef Link)
-
S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection", in Proc. Workshop on New Security Paradigms, ACM Press, New York, pp. 94-106, 1997. Article (CrossRef Link)
-
(1997)
Proc. Workshop on New Security Paradigms
, pp. 94-106
-
-
Cheung, S.1
Levitt, K.N.2
-
16
-
-
0035438937
-
IEEE 802.15.4: A developing standard for low-power low-cost wireless personal area networks
-
Sep/Oct, Article (CrossRef Link)
-
Gutierrez, J.A.; Naeve, M., Callaway, E., Bourgeois, M., Mitter, V. and Heile, B., "IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks, " Network, IEEE, vol. 15, no. 5, pp.12-19, Sep/Oct. 2001. Article (CrossRef Link)
-
(2001)
Network, IEEE
, vol.15
, Issue.5
, pp. 12-19
-
-
Gutierrez, J.A.1
Naeve, M.2
Callaway, E.3
Bourgeois, M.4
Mitter, V.5
Heile, B.6
-
17
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Feb., Article (CrossRef Link)
-
Yih-Chun Hu; Perrig, A. and Johnson, D.B., "Wormhole attacks in wireless networks, " Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370-380, Feb. 2006. Article (CrossRef Link)
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
|