-
1
-
-
33746701317
-
A comparison of epidemic algorithms in wireless sensor networks
-
DOI 10.1016/j.comcom.2006.02.010, PII S0140366406000442
-
AKDERE, M., BILGIN, C., GERDANERI, O., KORPEOGLU, I., ULUSOY, O., AND CETINTEMEL, U. A comparison of epidemic algorithms in wireless sensor networks. Computer Communications 29, 13-14 (Aug. 2006), 2450-2457. (Pubitemid 44162976)
-
(2006)
Computer Communications
, vol.29
, Issue.13-14
, pp. 2450-2457
-
-
Akdere, M.1
Bilgin, C.C.2
Gerdaneri, O.3
Korpeoglu, I.4
Ulusoy, O.5
Cetintemel, U.6
-
2
-
-
78751656698
-
A model with applications for data survivability in critical infrastructures
-
ALBANO, M., CHESSA, S., AND DI PIETRO, R. A model with applications for data survivability in critical infrastructures. Journal of Information Assurance and Security 4, 6 (2009), 629-639.
-
(2009)
Journal of Information Assurance and Security
, vol.4
, Issue.6
, pp. 629-639
-
-
Albano, M.1
Chessa, S.2
Di Pietro, R.3
-
3
-
-
34548312516
-
Information survival threshold in sensor and P2P networks
-
DOI 10.1109/INFCOM.2007.156, 4215738, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
CHAKRABARTI, D., LESKOVEC, J., FALOUTSOS, C., MADDEN, S., GUESTRIN, C., AND FALOUTSOS, M. Information Survival Threshold in Sensor and P2P Networks. IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (May 2007), 1316-1324. (Pubitemid 47334356)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1316-1324
-
-
Chakrabarti, D.1
Leskovec, J.2
Faloutsos, C.3
Madden, S.4
Guestrin, C.5
Faloutsos, M.6
-
4
-
-
85030178366
-
Epidemic algorithms for replicated database maintenance
-
New York, NY, USA ACM
-
DEMERS, A., GREENE, D., HAUSER, C., IRISH, W., LARSON, J., SHENKER, S., STURGIS, H., SWINEHART, D., AND TERRY, D. Epidemic algorithms for replicated database maintenance. In PODC '87: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing (New York, NY, USA, 1987), ACM, pp. 1-12.
-
(1987)
PODC '87: Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing
, pp. 1-12
-
-
Demers, A.1
Greene, D.2
Hauser, C.3
Irish, W.4
Larson, J.5
Shenker, S.6
Sturgis, H.7
Swinehart, D.8
Terry, D.9
-
5
-
-
58149086240
-
Proactive co-operative self-healing in unattended wireless sensor networks
-
Washington, DC, USA IEEE Computer Society
-
DI PIETRO, R., MA, D., SORIENTE, C., AND TSUDIK, G. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. In SRDS '08: Proceedings of the 2008 Symposium on Reliable Distributed Systems (Washington, DC, USA, 2008), IEEE Computer Society, pp. 185-194.
-
(2008)
SRDS '08: Proceedings of the 2008 Symposium on Reliable Distributed Systems
, pp. 185-194
-
-
Di Pietro, R.1
Ma, D.2
Soriente, C.3
Tsudik, P.G.4
-
6
-
-
49149089237
-
Catch me (If you can): Data survival in unattended sensor networks
-
Mar.
-
DI PIETRO, R., MANCINI, L. V., SORIENTE, C., SPOGNARDI, A., AND TSUDIK, G. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) (Mar. 2008), 185-194.
-
(2008)
2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)
, pp. 185-194
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
7
-
-
70449419951
-
Data security in unattended wireless sensor networks
-
DI PIETRO, R., MANCINI, L. V., SORIENTE, C., SPOGNARDI, A., AND TSUDIK, G. Data Security in Unattended Wireless Sensor Networks. IEEE Transactions on Computers 58, 11 (2009), 1500-1511.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.11
, pp. 1500-1511
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
8
-
-
67650465277
-
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
-
Nov.
-
DI PIETRO, R., MANCINI, L. V., SORIENTE, C., SPOGNARDI, A., AND TSUDIK, G. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7, 8 (Nov. 2009), 1463-1475.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1463-1475
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
10
-
-
77953295155
-
Intrusion-resilience in mobile unattended WSNs
-
San Diego, California, USA, Mar. IEEE Press
-
DI PIETRO, R., OLIGERI, G., SORIENTE, C., AND TSUDIK, G. Intrusion-Resilience in Mobile Unattended WSNs. In Proceedings IEEE INFOCOM (San Diego, California, USA, Mar. 2010), IEEE Press, pp. 1-9.
-
(2010)
Proceedings IEEE INFOCOM
, pp. 1-9
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
11
-
-
33745180496
-
Decentralized erasure codes for distributed networked storage
-
DOI 10.1109/TIT.2006.874535
-
DIMAKIS, A. G., PRABHAKARAN, V., AND RAMCHANDRAN, K. Decentralized erasure codes for distributed networked storage. IEEE/ACM Trans. Netw. 14 (June 2006), 2809-2816. (Pubitemid 43898929)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2809-2816
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
13
-
-
31844435712
-
A note on the spread of worms in scale-free networks
-
DOI 10.1109/TSMCB.2005.854498
-
GRIFFIN, C., AND BROOKS, R. A note on the spread of worms in scale-free networks. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 36, 1 (2006), 198-202. (Pubitemid 43179774)
-
(2006)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.36
, Issue.1
, pp. 198-202
-
-
Griffin, C.1
Brooks, R.2
-
16
-
-
70450230362
-
Towards an analytic model of epidemic spreading in heterogeneous systems
-
New York, NY, USA QSHINE '07, ACM
-
LI, X., PARKER, T. P., AND XU, S. Towards an analytic model of epidemic spreading in heterogeneous systems. In The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (New York, NY, USA, 2007), QSHINE '07, ACM.
-
(2007)
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
-
-
Li, X.1
Parker, T.P.2
Xu, S.3
-
17
-
-
44649201143
-
Stochastic analysis of network coding in epidemic routing
-
June
-
LIN, Y., LI, B., AND LIANG, B. Stochastic analysis of network coding in epidemic routing. IEEE Journal on Selected Areas in Communications 26, 5 (June 2008), 794-808.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.5
, pp. 794-808
-
-
Lin, Y.1
Li, B.2
Liang, B.3
-
18
-
-
65249138169
-
New adversary and new threats: Security in unattended sensor networks
-
Mar.
-
MA, D., SORIENTE, C., AND TSUDIK, G. New adversary and new threats: security in unattended sensor networks. IEEE Network 23, 2 (Mar. 2009), 43-48.
-
(2009)
IEEE Network
, vol.23
, Issue.2
, pp. 43-48
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
19
-
-
58049110209
-
DISH: Distributed self-healing
-
Detroit, MI Springer-Verlag
-
MA, D., AND TSUDIK, G. DISH: Distributed Self-Healing. In SSS '08: Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems (Detroit, MI, 2008), Springer-Verlag, pp. 47-62.
-
(2008)
SSS '08: Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
, pp. 47-62
-
-
Ma, D.1
Tsudik, G.2
-
20
-
-
41349106348
-
Spread of epidemic disease on networks
-
July
-
NEWMAN, M. Spread of epidemic disease on networks. Physical Review E 66, 1 (July 2002), 1-11.
-
(2002)
Physical Review E
, vol.66
, Issue.1
, pp. 1-11
-
-
Newman, M.1
-
21
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
DOI 10.1103/PhysRevLett.86.3200
-
PASTOR-SATORRAS, R., AND VESPIGNANI, A. Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86, 14 (Apr. 2001), 3200-3203. (Pubitemid 32317894)
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
22
-
-
77958110931
-
Network coding based dependable and efficient data survival in unattended wireless sensor networks
-
REN, W., ZHAO, J., AND REN, Y. Network coding based dependable and efficient data survival in unattended wireless sensor networks. JCM 4, 11 (2009), 894-901.
-
(2009)
JCM
, vol.4
, Issue.11
, pp. 894-901
-
-
Ren, W.1
Zhao, J.2
Ren, Y.3
-
23
-
-
34247361254
-
SCUBA: Secure Code Update by Attestation in sensor networks
-
DOI 10.1145/1161289.1161306, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
SESHADRI, A., LUK, M., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. K. Scuba: Secure code update by attestation in sensor networks. In Workshop on Wireless Security'06 (2006), pp. 85-94. (Pubitemid 46634305)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
25
-
-
77956473159
-
Cads: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks
-
Z., R.
-
Z., R., SUN, X., LIANG, W., SUN, D., AND XIA, Z. Cads: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks. Inform. Technol. J. 9, 7 (2010), 1361-1368.
-
(2010)
Inform. Technol. J.
, vol.9
, Issue.7
, pp. 1361-1368
-
-
Sun, X.1
Liang, W.2
Sun, D.3
Xia, Z.4
|