-
1
-
-
77952147526
-
Fuzzy logic-based decision making for detecting distributed node-exhaustion attacks in wireless sensor networks
-
Zubair A. Baig and Salman A. Khan "Fuzzy Logic-based Decision Making for Detecting Distributed Node-Exhaustion Attacks in Wireless Sensor Networks" Second International Conference on Future Networks, 2010.
-
(2010)
Second International Conference on Future Networks
-
-
Baig, Z.A.1
Khan, S.A.2
-
2
-
-
80052193682
-
-
from http://en.wikipedia.org/wiki/Wireless-sensor-network.
-
-
-
-
4
-
-
84864048969
-
Wireless sensor networks: A survey of intrusions and their explored remedies
-
Shivangi Raman, Amar Prakash, Cheshire Babu Pulla, Prateek Srivastava, Ashish Srivastava and Shveta Singh "Wireless sensor networks: A Survey of Intrusions and their Explored Remedies" International Journal of Engineering Science and Technology Vol. 2(5), 2010.
-
(2010)
International Journal of Engineering Science and Technology
, vol.2
, Issue.5
-
-
Raman, S.1
Prakash, A.2
Pulla, C.B.3
Srivastava, P.4
Srivastava, A.5
Singh, S.6
-
7
-
-
70249102120
-
Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
-
Idris M. Atakli, Hongbing Hu, Yu Chen, Wei-Shinn Ku and Zhou Su "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation" SpringSim, 2008.
-
(2008)
SpringSim
-
-
Atakli, I.M.1
Hu, H.2
Chen, Y.3
Ku, W.-S.4
Su, Z.5
-
8
-
-
80052215031
-
Configurable link layer security architecture for wireless sensor networks
-
July 2 - 4, London, U.K.
-
Devesh C. Jinwala, Dhiren R. Patel and Kankar S. Dasgupta "Configurable Link Layer Security Architecture for Wireless Sensor Networks" Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K.
-
(2008)
Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008
-
-
Jinwala, D.C.1
Patel, D.R.2
Dasgupta, K.S.3
-
9
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
May 25-27, UrbanaChampaign, Illinois, USA
-
Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood "The feasibility of Launching and Detecting Jamming Attacks in Wireless Networks" MobiHoc'05, May 25-27, 2005, UrbanaChampaign, Illinois, USA.
-
(2005)
MobiHoc'05
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
10
-
-
77953766580
-
Optimal jamming attack strategies and network defense policies in wireless sensor networks
-
AUGUST
-
Mingyan Li, Iordanis Koutsopoulos and Radha Poovendran "Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks" IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 8, AUGUST 2010.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.8
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
12
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
-
A.D. Wood, J.A. Stankovic, and G. Zhou. "DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks". In Proc. of SECON'07, 2007.
-
(2007)
Proc. of SECON'07
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
14
-
-
33745058163
-
Link-layer jamming attacks on S-MAC
-
1462013, Proceedings of the Second European Workshop onWireless Sensor Networks, EWSN 2005
-
Y.W. Law, P. Hartel, J. den Hartog and P. Havinga, "Link-layer jamming attacks on S-MAC", in Proceedings of IEEE WSN'05, 2005, pp.217-225. (Pubitemid 44172257)
-
(2005)
Proceedings of the Second European Workshop on Wireless Sensor Networks, EWSN 2005
, vol.2005
, pp. 217-225
-
-
Law, Y.W.1
Hartel, P.2
Hartog, J.D.3
Havinga, P.4
-
15
-
-
80052234154
-
Swarm intelligence algorithms in bioinformatics
-
Arpad Kelemen et al. (Eds.), Springer Verlag, Germany
-
Swagatam Das, Ajith Abraham and Amit Konar, "Swarm Intelligence Algorithms in Bioinformatics", Computational Intelligence in Bioinformatics, Arpad Kelemen et al. (Eds.), Springer Verlag, Germany, 2007.
-
(2007)
Computational Intelligence in Bioinformatics
-
-
Das, S.1
Abraham, A.2
Konar, A.3
|