-
2
-
-
35348897340
-
Channel surfing: Defending wireless sensor networks from interference
-
W. Xu, W. Trappe, and Y. Zhang, "Channel surfing: defending wireless sensor networks from interference," in IPSN '07: Proceedings of the 6th international conference on information processing in sensor networks, 2007, pp. 499-508.
-
(2007)
IPSN '07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks
, pp. 499-508
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
-
3
-
-
78650862556
-
Compromise-resilient anti-jamming for wireless sensor networks
-
Springer Berlin/Heidelberg
-
X. Jiang, W. Hu, S. Zhu, and G. Cao, "Compromise-resilient anti-jamming for wireless sensor networks," in Information and Communications Security, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2010, vol. 6476, pp. 140-154.
-
(2010)
Information and Communications Security, ser. Lecture Notes in Computer Science
, vol.6476
, pp. 140-154
-
-
Jiang, X.1
Hu, W.2
Zhu, S.3
Cao, G.4
-
4
-
-
77951563736
-
Lightweight jammer localization in wireless networks: System design and implementation
-
P. Konstantinos, K. Iordanis, I. Broustis, and S. V. Kr-ishnamurthy, "Lightweight jammer localization in wireless networks: system design and implementation," in GLOBE-COM'09: Proceedings of the 28th IEEE conference on Global telecommunications, 2009.
-
(2009)
GLOBE-com'09: Proceedings of the 28th IEEE Conference on Global Telecommunications
-
-
Konstantinos, P.1
Iordanis, K.2
Broustis, I.3
Kr-Ishnamurthy, S.V.4
-
5
-
-
77955405219
-
Wireless jamming localization by exploiting nodes' hearing ranges
-
Z. Liu, H. Liu, W. Xu, and Y. Chen, "Wireless jamming localization by exploiting nodes' hearing ranges," in DCOSS'10: Proceedings of the International Conference on Distributed Computing in Sensor System, 2010, pp. 348-361.
-
(2010)
DCOSS'10: Proceedings of the International Conference on Distributed Computing in Sensor System
, pp. 348-361
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
6
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in INFOCOM'07: Proceedings of the 26th IEEE International Conference on Computer Communications., 2007, pp. 1307 - 1315.
-
(2007)
INFOCOM'07: Proceedings of the 26th IEEE International Conference on Computer Communications
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
7
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
M. Strasser, B. Danev, and S. Čapkun, "Detection of reactive jamming in sensor networks," ACM Trans. Sen. Netw., vol. 7, pp. 16:1-16:29, 2010.
-
(2010)
ACM Trans. Sen. Netw.
, vol.7
, pp. 161-1629
-
-
Strasser, M.1
Danev, B.2
Čapkun, S.3
-
9
-
-
70349334200
-
Localizing jammers in wireless networks
-
H. Liu, W. Xu, Y. Chen, and Z. Liu, "Localizing jammers in wireless networks," in PERCOM'09: Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications, 2009, pp. 1-6.
-
(2009)
PERCOM'09: Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
, pp. 1-6
-
-
Liu, H.1
Xu, W.2
Chen, Y.3
Liu, Z.4
-
10
-
-
34247885928
-
Wireless sensor network localization techniques
-
G. Mao, B. Fidan, and B. D. O. Anderson, "Wireless sensor network localization techniques," Comput. Netw., vol. 51, pp. 2529-2553, 2007.
-
(2007)
Comput. Netw.
, vol.51
, pp. 2529-2553
-
-
Mao, G.1
Fidan, B.2
Anderson, B.D.O.3
|