-
1
-
-
74549201116
-
A cyber-physical middleware framework for continuous monitoring of water distribution systems
-
M. Iqbal and H. B. Lim, "A cyber-physical middleware framework for continuous monitoring of water distribution systems," in Proc. of the 7th ACM SenSys, 2009, pp. 401-402.
-
Proc. of the 7th ACM SenSys, 2009
, pp. 401-402
-
-
Iqbal, M.1
Lim, H.B.2
-
3
-
-
84877682149
-
-
"Planetary Skin," http://www.planetaryskin.org/home.
-
Planetary Skin
-
-
-
5
-
-
79951660520
-
Dsf - A distributed security framework for heterogeneous wireless sensor networks
-
H. Saxena, C. Ai, M. Valero, Y. Li, and R. Beyah, "Dsf - a distributed security framework for heterogeneous wireless sensor networks," in Military Communications Conference, 2010 - MILCOM 2010, 31 2010- nov. 3 2010.
-
Military Communications Conference, 2010 - MILCOM 2010, 31 2010- Nov. 3 2010
-
-
Saxena, H.1
Ai, C.2
Valero, M.3
Li, Y.4
Beyah, R.5
-
6
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
feb.
-
A. Pathan, H.-W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, feb. 2006, p. 6 pp. 1048.
-
(2006)
Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference
, vol.2
-
-
Pathan, A.1
Lee, H.-W.2
Hong, C.S.3
-
8
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2-3, pp. 293-315, September 2003.
-
(2003)
Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
9
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
January
-
F. Hu and N. K. Sharma, "Security considerations in ad hoc sensor networks," Elsevier's AdHoc Networks Journal, vol. 3, no. 1, pp. 69- 89, January 2005.
-
(2005)
Elsevier's AdHoc Networks Journal
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.K.2
-
10
-
-
72949104155
-
A survey on jamming attacks and countermeasures in wsns
-
quarter
-
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, "A survey on jamming attacks and countermeasures in wsns," Communications Surveys Tutorials, IEEE, vol. 11, no. 4, pp. 42 - 56, quarter 2009.
-
(2009)
Communications Surveys Tutorials, IEEE
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
11
-
-
3042785862
-
The sybil attack in sensor networks: Analysis defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis defenses," in Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on, april 2004, pp. 259-268.
-
Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium On, April 2004
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
12
-
-
78149468870
-
An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
-
nov.
-
S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," Industrial Informatics, IEEE Transactions on, vol. 6, no. 4, pp. 744-757, nov. 2010.
-
(2010)
Industrial Informatics, IEEE Transactions on
, vol.6
, Issue.4
, pp. 744-757
-
-
Shin, S.1
Kwon, T.2
Jo, G.-Y.3
Park, Y.4
Rhy, H.5
-
13
-
-
79952060290
-
Neighbor-based intrusion detection for wireless sensor networks
-
A. Stetsko, L. Folkman, and V. Matyass and, "Neighbor-based intrusion detection for wireless sensor networks," in Wireless and Mobile Communications (ICWMC), 2010 6th International Conference on, sept. 2010, pp. 420-425.
-
Wireless and Mobile Communications (ICWMC), 2010 6th International Conference On, Sept. 2010
, pp. 420-425
-
-
Stetsko, A.1
Folkman, L.2
Matyass, V.3
-
14
-
-
50949089755
-
A framework of machine learning based intrusion detection for wireless sensor networks
-
Z. Yu and J. Tsai, "A framework of machine learning based intrusion detection for wireless sensor networks," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC 08. IEEE International Conference on, june 2008, pp. 272-279.
-
Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC 08. IEEE International Conference On, June 2008
, pp. 272-279
-
-
Yu, Z.1
Tsai, J.2
-
15
-
-
56749183876
-
Wireless and physical security via embedded sensor networks
-
Proceedings of the first ACM conference on Wireless network security, ser.
-
M. J. Ocean and A. Bestavros, "Wireless and physical security via embedded sensor networks," in Proceedings of the first ACM conference on Wireless network security, ser. WiSec 08, 2008, pp. 131-139.
-
(2008)
WiSec 08
, pp. 131-139
-
-
Ocean, M.J.1
Bestavros, A.2
-
16
-
-
78650142356
-
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network
-
Proceedings of the 3rd ACM workshop on Artificial intelligence and security, ser. ACM
-
P. Krishnamoorthy and M. Wright, "Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network," in Proceedings of the 3rd ACM workshop on Artificial intelligence and security, ser. AISec '10. ACM, 2010.
-
(2010)
AISec '10
-
-
Krishnamoorthy, P.1
Wright, M.2
-
17
-
-
78649258582
-
The intrusion detection in mobile sensor network
-
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, ser. ACM
-
Y. Keung, B. Li, and Q. Zhang, "The intrusion detection in mobile sensor network," in Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, ser. MobiHoc '10. ACM, 2010, pp. 11-20.
-
(2010)
MobiHoc '10
, pp. 11-20
-
-
Keung, Y.1
Li, B.2
Zhang, Q.3
|