-
1
-
-
84859042889
-
Social behaviors of the California sea lion, bottlenose dolphin, and orca whal
-
in Xiao, Y. (Ed.). CRC Press, New York, NY
-
Adams, N.W. and Xiao, Y. (2011) 'Social behaviors of the California sea lion, bottlenose dolphin, and orca whale', in Xiao, Y. (Ed.): Bio-inspired Computing and Networking, CRC Press, New York, NY, pp.19-40.
-
(2011)
Bio-inspired Computing and Networking
, pp. 19-40
-
-
Adams, N.W.1
Xiao, Y.2
-
2
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
Al-Karaki, J.N. (2006) 'Analysis of routing security-energy trade-offs in wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.147-157.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
3
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz, O. and Qi, H. (2006) 'Load-balanced key establishment methodologies in wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.158-166.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
4
-
-
39349109602
-
Design and analysis of a multipacket signature detection system
-
Artan, N.S. and Chao, H.J. (2007) 'Design and analysis of a multipacket signature detection system', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.122-136.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 122-136
-
-
Artan, N.S.1
Chao, H.J.2
-
5
-
-
85120720332
-
Editorial
-
Chen, H. and Guizani, M. (2007) 'Editorial', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.1-2.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 1-2
-
-
Chen, H.1
Guizani, M.2
-
6
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Chen, Z. and Ji, C. (2007) 'Optimal worm-scanning method using vulnerable-host distributions', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.71-80.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
7
-
-
77955710234
-
Convertible identity-based anonymous designated ring signatures
-
Chen, Y., Susilo, W. and Mu, Y. (2006) 'Convertible identity-based anonymous designated ring signatures', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.218-225.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 218-225
-
-
Chen, Y.1
Susilo, W.2
Mu, Y.3
-
8
-
-
13444292210
-
Effective leadership and decision-making in animal groups on the move
-
DOI 10.1038/nature03236
-
Couzin, I.D., Krause J., Franks, N.R. and Levin, SA. (2005) 'Effective leadership and decision-making in animal groups on the move', Nature, Vol. 433, pp.513-516. (Pubitemid 40204306)
-
(2005)
Nature
, vol.433
, Issue.7025
, pp. 513-516
-
-
Couzin, I.D.1
Krause, J.2
Franks, N.R.3
Levin, S.A.4
-
9
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng, J., Han, R. and Mishra, S. (2006) 'Limiting DoS attacks during multihop data delivery in wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.167-178.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
10
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
Englund, H. and Johansson, T. (2006) 'Three ways to mount distinguishing attacks on irregularly clocked stream ciphers', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.95-102.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
11
-
-
74049111426
-
Hash-AV: Fast virus signature scanning by cache-resident filters
-
Erdogan, O. and Cao, P. (2007) 'Hash-AV: fast virus signature scanning by cache-resident filters', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.50-59.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
12
-
-
74549166520
-
Wireless networking security: Open issues in trust, management, interoperation and measurement
-
Evans, J.B., Wang, W. and Ewy, B.J. (2006) 'Wireless networking security: open issues in trust, management, interoperation and measurement', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.84-94.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
14
-
-
74549177130
-
Defence against packet injection in ad hoc networks
-
Gu, Q., Liu, P., Chu, C. and Zhu, S. (2007) 'Defence against packet injection in ad hoc networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.154-169.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 154-169
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
Zhu, S.4
-
15
-
-
70449498446
-
A taxonomy of internet traceback
-
Hamadeh, I. and Kesidis, G. (2006) 'A taxonomy of internet traceback', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.54-61.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 54-61
-
-
Hamadeh, I.1
Kesidis, G.2
-
16
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
Hwu, J., Hsu, S., Lin, Y-B. and Chen, R. (2006) 'End-to-end security mechanisms for SMS', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.177-183.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 177-183
-
-
Hwu, J.1
Hsu, S.2
Lin, Y.-B.3
Chen, R.4
-
17
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Jiang, Y., Lin, C., Shi, M. and Shen, X. (2006) 'A self-encryption authentication protocol for teleconference services', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.198-205.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
18
-
-
77954341184
-
An approach to synthesise safe systems
-
Jhumka, A., Freiling, F., Fetzer, C. and Suri, N. (2006) 'An approach to synthesise safe systems', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.62-74.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
19
-
-
56849130276
-
Vulnerability analysis of certificate graphs
-
Jung, E. and Gouda, M.G. (2006) 'Vulnerability analysis of certificate graphs', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.13-23.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Jung, E.1
Gouda, M.G.2
-
20
-
-
79954597540
-
Privacy protection system and metrics for hiding electrical events
-
Kalogridis, G., Denic, S.Z., Lewis, T. and Cepeda, R. (2011) 'Privacy protection system and metrics for hiding electrical events', International Journal of Security and Networks, Vol. 6, No. 1, pp.14-27.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 14-27
-
-
Kalogridis, G.1
Denic, S.Z.2
Lewis, T.3
Cepeda, R.4
-
21
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
Karyotis, V., Papavassiliou, S., Grammatikou, M. and Maglaris, V. (2006) 'A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.255-265.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
22
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
Kiayias, A. and Yung, M. (2006) 'Secure scalable group signature with dynamic joins and separable authorities', International Journal of Security and Networks, Vol. 1, Nos. 1-/2, pp.24-45.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
23
-
-
34547148771
-
Single packet IP traceback in AS-level partial deployment scenario
-
Korkmaz, T., Gong, C., Sarac, K. and Dykes, S.G. (2007) 'Single packet IP traceback in AS-level partial deployment scenario', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.95-108.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 95-108
-
-
Korkmaz, T.1
Gong, C.2
Sarac, K.3
Dykes, S.G.4
-
24
-
-
79954619874
-
Towards modelling the impact of cyber attacks on a smart grid
-
Kundur, D., Feng, X., Mashayekh, S., Liu, S., Zourntos, T. and Butler-Purry, K.L. (2011) 'Towards modelling the impact of cyber attacks on a smart grid', International Journal of Security and Networks, Vol. 6, No. 1, pp.2-13.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 2-13
-
-
Kundur, D.1
Feng, X.2
Mashayekh, S.3
Liu, S.4
Zourntos, T.5
Butler-Purry, K.L.6
-
25
-
-
80051732181
-
Architecture and protocol design for a pervasive robot swarm communication networks
-
Li, M., Harris, J., Chen, M., Mao, S., Xiao, Y., Read, W. and Prabhakaran, B. (2011) 'Architecture and protocol design for a pervasive robot swarm communication networks', Wireless Communications and Mobile Computing (WCMC), Vol. 11, No. 8, pp.1092-1106.
-
(2011)
Wireless Communications and Mobile Computing (WCMC)
, vol.11
, Issue.8
, pp. 1092-1106
-
-
Li, M.1
Harris, J.2
Chen, M.3
Mao, S.4
Xiao, Y.5
Read, W.6
Prabhakaran, B.7
-
26
-
-
79551652560
-
DKMS: Distributed hierarchical access control for multimedia networks
-
Li, R., Li, J. and Chen, H. (2007) 'DKMS: distributed hierarchical access control for multimedia networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.3-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
27
-
-
79954614519
-
Secure and privacy-preserving information aggregation for smart grids
-
Li, F., Luo, B. and Liu, P. (2011) 'Secure and privacy-preserving information aggregation for smart grids', International Journal of Security and Networks, Vol. 6, No. 1, pp.28-39.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 28-39
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
28
-
-
85124575179
-
Stochastic event capture using single robot moving along a certain track
-
Fujian, China
-
Liang, X., Xiao, Y. and Li, N. (2009) 'Stochastic event capture using single robot moving along a certain track', Proceedings of the 5th International Conference on Mobile ad-hoc and Sensor Networks (MSN 2009), Fujian, China.
-
(2009)
Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2009)
-
-
Liang, X.1
Xiao, Y.2
Li, N.3
-
29
-
-
76349095151
-
Bio-inspired true coalition formation on intrusion detection by mobile robots
-
Washington, DC, USA
-
Liang, X. and Xiao, Y. (2009a) 'Bio-inspired true coalition formation on intrusion detection by mobile robots', Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom09), Washington, DC, USA.
-
(2009)
Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom09)
-
-
Liang, X.1
Xiao, Y.2
-
30
-
-
77952216506
-
Stochastic capturing moving intrusions by mobile sensors
-
CCIS 60, Jeju Island, Korea
-
Liang, X. and Xiao, Y. (2009b) 'Stochastic capturing moving intrusions by mobile sensors', Proceedings of the 2009 International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB 2009), CCIS 60, Jeju Island, Korea, pp.59-66.
-
(2009)
Proceedings of the 2009 International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB 2009)
, pp. 59-66
-
-
Liang, X.1
Xiao, Y.2
-
31
-
-
70349918459
-
Modeling collaborative robots for detecting intrusions
-
Baltimore, MD
-
Liang, X. and Xiao, Y. (2009c) 'Modeling collaborative robots for detecting intrusions', Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems (CTS 2009), Baltimore, MD, pp.306-313.
-
(2009)
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems (CTS 2009)
, pp. 306-313
-
-
Liang, X.1
Xiao, Y.2
-
32
-
-
77955759091
-
Capturing intrusions by mobile robot in rectangular perimeter
-
Heilongjiang, China
-
Liang, X. and Xiao, Y. (2010a) 'Capturing intrusions by mobile robot in rectangular perimeter', Proceedings of 2010 IEEE International Conference on Information and Automation (ICIA 2010), Heilongjiang, China, pp.1404-1409.
-
(2010)
Proceedings of 2010 IEEE International Conference on Information and Automation (ICIA 2010)
, pp. 1404-1409
-
-
Liang, X.1
Xiao, Y.2
-
33
-
-
77952582720
-
Studying bio-inspired coalition formation of robots for detecting intrusions using game theory
-
Liang, X. and Xiao, Y. (2010b) 'Studying bio-inspired coalition formation of robots for detecting intrusions using game theory', IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory, Vol. 40, No. 3, pp.683-693.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory
, vol.40
, Issue.3
, pp. 683-693
-
-
Liang, X.1
Xiao, Y.2
-
34
-
-
84879923368
-
Stochastic event capturing with a single mobile robot in rectangular perimeters
-
Springer DOI: 10.1007/s11235-011-9570-9
-
Liang, X., Xiao, Y., Zhang, J., Deng, H. and Vasilakos, A.V. (2011) 'Stochastic event capturing with a single mobile robot in rectangular perimeters', Telecommunication Systems Journal, Special Issue in Recent Advance in Mobile Sensor Networks, Springer, DOI: 10.1007/s11235-011-9570-9.
-
(2011)
Telecommunication Systems Journal, Special Issue in Recent Advance in Mobile Sensor Networks
-
-
Liang, X.1
Xiao, Y.2
Zhang, J.3
Deng, H.4
Vasilakos, A.V.5
-
35
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
Ling, H. and Znati, T. (2007) 'End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.109-121.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
36
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
-
Liu, Y., Comaniciu, C. and Man, H. (2006) 'Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.243-254.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
37
-
-
77952585809
-
Bio-inspired visual attention in agile sensing for target detection
-
Liu, J., Xiao, Y., Hao, Q. and Ghaboosi, K. (2009) 'Bio-inspired visual attention in agile sensing for target detection', International Journal of Sensor Networks, Vol. 5, No. 2, pp.98-111.
-
(2009)
International Journal of Sensor Networks
, vol.5
, Issue.2
, pp. 98-111
-
-
Liu, J.1
Xiao, Y.2
Hao, Q.3
Ghaboosi, K.4
-
38
-
-
80052385044
-
A bio-inspired time synchronization algorithm for wireless sensor networks
-
Chengdu, China
-
Liu, L., Xiao, Y. and Zhang, J. (2010) 'A bio-inspired time synchronization algorithm for wireless sensor networks', Proceedings of 2010 2nd International Conference on Computer Engineering and Technology (ICCET 2010), Chengdu, China.
-
(2010)
Proceedings of 2010 2nd International Conference on Computer Engineering and Technology (ICCET 2010)
-
-
Liu, L.1
Xiao, Y.2
Zhang, J.3
-
39
-
-
74549116861
-
Securing Wi-Fi networks with position verification: Extended version
-
Malaney, R.A. (2007) 'Securing Wi-Fi networks with position verification: extended version', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.27-36.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.A.1
-
40
-
-
0001158846
-
Absence of ferromagnetism or anti-ferromagnetism in one or two-dimensional isotropic Heisenberg models
-
Mermin, N.D. and Wagner, H. (1966) 'Absence of ferromagnetism or anti-ferromagnetism in one or two-dimensional isotropic Heisenberg models', Physical Review Letters, Vol. 17, No. 22, pp.1133-1136.
-
(1966)
Physical Review Letters
, vol.17
, Issue.22
, pp. 1133-1136
-
-
Mermin, N.D.1
Wagner, H.2
-
41
-
-
33746327503
-
Ecological networks and their fragility
-
DOI 10.1038/nature04927, PII NATURE04927
-
Montoya, J.M., Pimm, S.L. and Solé, R.V. (2006) 'Ecological networks and their fragility', Nature, Vol. 442, pp.259-264. (Pubitemid 44114895)
-
(2006)
Nature
, vol.442
, Issue.7100
, pp. 259-264
-
-
Montoya, J.M.1
Pimm, S.L.2
Sole, R.V.3
-
42
-
-
77955290752
-
An adaptive expert system approach for intrusion detection
-
Owens, S.F. and Levary, R.R. (2006) 'An adaptive expert system approach for intrusion detection', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.206-217.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 206-217
-
-
Owens, S.F.1
Levary, R.R.2
-
43
-
-
79551647519
-
Vulnerabilities in distance-indexed IP traceback schemes
-
Pan, J., Cai, L. and Shen, X. (2007) 'Vulnerabilities in distance-indexed IP traceback schemes', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.81-94.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 81-94
-
-
Pan, J.1
Cai, L.2
Shen, X.3
-
44
-
-
44949242883
-
Computational ecology: From the complex to the simple and back
-
Pascual, M. (2005) 'Computational ecology: from the complex to the simple and back', PLoS Computational Biology, Vol. 1, No. 2, pp.101-105.
-
(2005)
PLoS Computational Biology
, vol.1
, Issue.2
, pp. 101-105
-
-
Pascual, M.1
-
45
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
Rabinovich, P. and Simon, R. (2007) 'Secure message delivery in publish/subscribe networks using overlay multicast', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.60-70.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
46
-
-
40949119439
-
Secure collaborations over message boards
-
Ramkumar, M. and Memon, N. (2006) 'Secure collaborations over message boards', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.113-124.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 113-124
-
-
Ramkumar, M.1
Memon, N.2
-
47
-
-
79954594099
-
-
IEEE 802.11n network International Journal of Security and Networks
-
Ramsey, B.W., Mullins, B.E., Thomas, R.W. and Andel, T.R. (2011) 'Subjective audio quality over a secure IEEE 802.11n network', International Journal of Security and Networks, Vol. 6, No. 1, pp.53-63.
-
(2011)
Subjective Audio Quality over A Secure
, vol.6
, Issue.1
, pp. 53-63
-
-
Ramsey, B.W.1
Mullins, B.E.2
Thomas, R.W.3
Andel, T.R.4
-
48
-
-
0023379184
-
Flocks, herds, and schools: A distributed behavioral model
-
Reynolds, C.W. (1987) 'Flocks, herds, and schools: a distributed behavioral model', Computer Graphics, Vol. 21, No. 4, pp.25-34.
-
(1987)
Computer Graphics
, vol.21
, Issue.4
, pp. 25-34
-
-
Reynolds, C.W.1
-
49
-
-
33746374366
-
Structural asymmetry and the stability of diverse food webs
-
DOI 10.1038/nature04887, PII NATURE04887
-
Rooney, N., McCann, K., Gellner, G. and Moore, J.C. (2006) 'Structural asymmetry and the stability of diverse food webs', Nature, Vol. 442, pp.265-269. (Pubitemid 44114896)
-
(2006)
Nature
, vol.442
, Issue.7100
, pp. 265-269
-
-
Rooney, N.1
McCann, K.2
Gellner, G.3
Moore, J.C.4
-
50
-
-
42649122222
-
Adaptive trust-based anonymous network
-
Sakarindr, P. and Ansari, N. (2007) 'Adaptive trust-based anonymous network', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.11-26.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 11-26
-
-
Sakarindr, P.1
Ansari, N.2
-
51
-
-
34548601229
-
Workflow authorisation in mediator-free environments
-
Shehab, M., Bertino, E. and Ghafoor, A. (2006) 'Workflow authorisation in mediator-free environments', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.2-12.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 2-12
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
52
-
-
74549171036
-
On pairwise connectivity of wireless multihop networks
-
Sun, F. and Shayman, M.A. (2007) 'On pairwise connectivity of wireless multihop networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.37-49.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 37-49
-
-
Sun, F.1
Shayman, M.A.2
-
53
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan, C. (2006) 'A new signature scheme without random oracles', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.237-242.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
54
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo, J., Tan, C. and Ng, J. (2006) 'Low-power authenticated group key agreement for heterogeneous wireless networks', International Journal of Security and Networks, Vol. 1, Nos. 3-4, pp.226-236.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
55
-
-
0032185311
-
Flocks, herds, and schools: A quantitative theory of flocking
-
Toner, J. and Tu, Y. (1998) 'Flocks, herds, and schools: a quantitative theory of flocking', Physical Review E, Vol. 58, pp.4828-4858. (Pubitemid 128596420)
-
(1998)
Physical Review E - Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics
, vol.58
, Issue.4
, pp. 4828-4858
-
-
Toner, J.1
Tu, Y.2
-
56
-
-
0001730998
-
Novel type of phase transition in a system of self-driven particles
-
Vicsek, T., Cziróok, A., Ben-Jacob, E., Cohen, I. and Shochet, O. (1995) 'Novel type of phase transition in a system of self-driven particles', Physical Review Letter, Vol. 75, No. 6, pp.1226-1229.
-
(1995)
Physical Review Letter
, vol.75
, Issue.6
, pp. 1226-1229
-
-
Vicsek, T.1
Cziróok, A.2
Ben-Jacob, E.3
Cohen, I.4
Shochet, O.5
-
57
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang, X. (2006) 'The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.184-197.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
58
-
-
49949083706
-
Elliptic curve cryptography-based access control
-
Wang, H., Sheng, B. and Li, Q. (2006) 'Elliptic curve cryptography-based access control', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.127-137.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
62
-
-
79951685922
-
Editorial: Security issues on sensor networks
-
Xiao, Y., Jia, X., Sun, B. and Du, X. (2006) 'Editorial: security issues on sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.125-126.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
63
-
-
77449136028
-
Bio-inspired communications among robots, sensors, and RFID tags
-
Changchun, China
-
Xiao, Y. and Liang, X. (2009a) 'Bio-inspired communications among robots, sensors, and RFID tags', Proceeding of the 2009 IEEE International Conference on Mechatronics and Automation (ICMA 2009), Changchun, China, pp.3573-3578.
-
(2009)
Proceeding of the 2009 IEEE International Conference on Mechatronics and Automation (ICMA 2009)
, pp. 3573-3578
-
-
Xiao, Y.1
Liang, X.2
-
64
-
-
70449433534
-
Surveillance and tracking system with collaboration of robots sensor nodes and RFID tags
-
San Francisco, CA, USA
-
Xiao, Y. and Zhang, Y. (2009b) 'Surveillance and tracking system with collaboration of robots, sensor nodes, and RFID tags', Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009), San Francisco, CA, USA.
-
(2009)
Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009)
-
-
Xiao, Y.1
Zhang, Y.2
-
65
-
-
84879604927
-
A critical line based boundary surveillance strategy in wireless sensor networks
-
Special issue on Challenges in Next-Generation and Resource-Constrained Networks. DOI: 10.1007/s11235-011-9453-0. 2011
-
Xiao, Y. and Zhang, Y. (2011a) 'A critical line based boundary surveillance strategy in wireless sensor networks', Telecommunication Systems Journal, Special issue on Challenges in Next-Generation and Resource-Constrained Networks. DOI: 10.1007/s11235-011-9453-0. 2011.
-
(2011)
Telecommunication Systems Journal
-
-
Xiao, Y.1
Zhang, Y.2
-
66
-
-
79960496883
-
Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags
-
Xiao, Y. and Zhang, Y. (2011b) 'Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags', Wireless Communications and Mobile Computing, Special Issue in Emerging Techniques for Wireless Vehicular Communications, Vol. 11, No. 7, pp.964-979.
-
(2011)
Wireless Communications and Mobile Computing, Special Issue in Emerging Techniques for Wireless Vehicular Communications
, vol.11
, Issue.7
, pp. 964-979
-
-
Xiao, Y.1
Zhang, Y.2
-
67
-
-
84859081367
-
Primate-inspired communication methods for mobile and static sensors and RFID tags
-
Xiao, Y., Zhang, Y. and Liang, X. (2011) 'Primate-inspired communication methods for mobile and static sensors and RFID tags', ACM Transactions on Autonomous and Adaptive Systems, Vol. 6, No. 4.
-
(2011)
ACM Transactions on Autonomous and Adaptive Systems
, vol.6
, Issue.4
-
-
Xiao, Y.1
Zhang, Y.2
Liang, X.3
-
68
-
-
79954585471
-
Application-aware secure multicast for power grid communications
-
Zhang, J. and Gunter, C.A. (2011) 'Application-aware secure multicast for power grid communications', International Journal of Security and Networks, Vol. 6, No. 1, pp.40-52.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 40-52
-
-
Zhang, J.1
Gunter, C.A.2
-
69
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
Zheng, J., Li, J., Lee, M.J. and Anshel, M. (2006) 'A lightweight encryption and authentication scheme for wireless sensor networks', International Journal of Security and Networks, Vol. 1, Nos. 3/4, pp.138-146.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
70
-
-
77449144449
-
A boundary surveillance strategy based on critical line in wireless sensor networks
-
Changchun, China
-
Zhang, Y. and Xiao, Y. (2009a) 'A boundary surveillance strategy based on critical line in wireless sensor networks', Proceedings of the 2009 IEEE International Conference on Mechatronics and Automation (ICMA 2009), Changchun, China, pp.459-464.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Mechatronics and Automation (ICMA 2009)
, pp. 459-464
-
-
Zhang, Y.1
Xiao, Y.2
-
71
-
-
70449101125
-
Primate-inspired scent marking for mobile and static sensors and RFID tags
-
San Francisco, CA, USA
-
Zhang, Y. and Xiao, Y. (2009b) 'Primate-inspired scent marking for mobile and static sensors and RFID tags', Proceedings of 18th International Conference on Computer Communications and Networks, (ICCCN 2009), San Francisco, CA, USA, pp.1-5.
-
(2009)
Proceedings of 18th International Conference on Computer Communications and Networks, (ICCCN 2009)
, pp. 1-5
-
-
Zhang, Y.1
Xiao, Y.2
-
72
-
-
70449134609
-
Primate social systems, scent-marking, and their applications in mobile and static sensor networks
-
Zhang, Y., Xiao, Y. and Bales, K.L. (2009) 'Primate social systems, scent-marking, and their applications in mobile and static sensor networks', International Journal of Sensor Networks, Vol. 5, No. 4, pp.210-222.
-
(2009)
International Journal of Sensor Networks
, vol.5
, Issue.4
, pp. 210-222
-
-
Zhang, Y.1
Xiao, Y.2
Bales, K.L.3
-
73
-
-
84874704343
-
A patrolling scheme in wireless sensor and robot networks
-
in conjunction with IEEE INFOCOM 2011, Shanghai, China
-
Zhang, Y. and Xiao, Y. (2011) 'A patrolling scheme in wireless sensor and robot networks', Proceedings of the 3rd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN 2011) in conjunction with IEEE INFOCOM 2011, Shanghai, China.
-
(2011)
Proceedings of the 3rd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN 2011)
-
-
Zhang, Y.1
Xiao, Y.2
-
74
-
-
79551551587
-
Analysis of flow-correlation attacks in anonymity network
-
Zhu, Y., Fu, X., Bettati, R. and Zhao, W. (2007) 'Analysis of flow-correlation attacks in anonymity network', International Journal of Security and Networks, Vol. 2, Nos. 1-2, pp.137-153.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
75
-
-
38349171412
-
Building trust in peer-to-peer systems: A review
-
Zhu, B., Jajodia, S. and Kankanhalli, M.S. (2006) 'Building trust in peer-to-peer systems: a review', International Journal of Security and Networks, Vol. 1, Nos. 1/2, pp.103-112.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 103-112
-
-
Zhu, B.1
Jajodia, S.2
Kankanhalli, M.S.3
|