-
1
-
-
4344668573
-
Overview of sensor networks
-
Culler D, Estrin D, Srivastava M. Overview of sensor networks. IEEE Computer Magazine, 2004, 37(8): 41-49.
-
(2004)
IEEE Computer Magazine
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
2
-
-
4243114087
-
Application driven systems research: habitat monitoring with sensor networks
-
Szewczyk R, Osterweil E, Polastre J, Hamilton M, Mainwaring A, Estrin D. Application driven systems research: habitat monitoring with sensor networks. Communications of the ACM, 2004, 47(6): 34-40.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 34-40
-
-
Szewczyk, R.1
Osterweil, E.2
Polastre, J.3
Hamilton, M.4
Mainwaring, A.5
Estrin, D.6
-
4
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
Yang H, Ye F, Yuan Y, Lu S, Arbaugh W. Toward resilient security in wireless sensor networks. In: Proceedings of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 2005, 34-45.
-
(2005)
Proceedings of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 34-45
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
8
-
-
0034775309
-
Hash-based IP traceback
-
Snoeren A C, Partridge C, Sanchez L A, Jones C E, Tchakountio F, Kent S T, Timothy Strayer W. Hash-based IP traceback. In: Proceedings of 2001 SIGCOMM. 2001, 3-14.
-
(2001)
Proceedings of 2001 SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Timothy Strayer, W.7
-
9
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Song D, Perrig A. Advanced and authenticated marking schemes for IP traceback. In: Proceedings of 20th IEEE INFOCOM. 2001, 878-886.
-
(2001)
Proceedings of 20th IEEE INFOCOM
, pp. 878-886
-
-
Song, D.1
Perrig, A.2
-
10
-
-
3543126644
-
Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation
-
Li J, Sung M, Xu J, Li L, Zhao Q. Large-scale IP traceback in high-speed internet: practical techniques and theoretical foundation. In: Proceedings of 2004 IEEE Symposium on Security and Privacy. 2004, 115-129.
-
(2004)
Proceedings of 2004 IEEE Symposium on Security and Privacy
, pp. 115-129
-
-
Li, J.1
Sung, M.2
Xu, J.3
Li, L.4
Zhao, Q.5
-
12
-
-
0002000920
-
Denial-of-service attacks Rip the internet
-
Garber L. Denial-of-service attacks Rip the internet. Computer, 2000, 33(4): 12-17.
-
(2000)
Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
15
-
-
34548339774
-
Beacon vector routing: scalable point-to-point routing in wireless sensornets
-
Fonseca R, Ratnasamy S, Zhao J, Tien Ee C, Culler D, Shenker S, Stoica I. Beacon vector routing: scalable point-to-point routing in wireless sensornets. In: Proceedings of 2nd USENIX Symposium on Network Design and Implementation. 2005, 329-342.
-
(2005)
Proceedings of 2nd USENIX Symposium on Network Design and Implementation
, pp. 329-342
-
-
Fonseca, R.1
Ratnasamy, S.2
Zhao, J.3
Tien Ee, C.4
Culler, D.5
Shenker, S.6
Stoica, I.7
|