-
1
-
-
27444438367
-
-
Technical report, Dept. of Computer Science, University of California at Davis
-
A. Bharathidasas and V. Anand, "Sensor networks: An overview," Technical report, Dept. of Computer Science, University of California at Davis, 2002.
-
(2002)
Sensor Networks: An Overview
-
-
Bharathidasas, A.1
Anand, V.2
-
2
-
-
2942686425
-
Sensor networks: Evolution, opportunities, and challenges
-
aug.
-
C. Chong and S. Kumar, "Sensor networks: evolution, opportunities, and challenges," Proceedings of the IEEE, vol. 91, no. 8, pp. 1247-2056, aug. 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-2056
-
-
Chong, C.1
Kumar, S.2
-
3
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ser. SenSys '04. New York, NY, USA: ACM, [Online]. Available
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in Proceedings of the 2nd international conference on Embedded networked sensor systems, ser. SenSys '04. New York, NY, USA: ACM, 2004, pp. 162-175. [Online]. Available: http://doi.acm.org/10.1145/1031495.1031515
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
4
-
-
3142694961
-
Sensor networks with mobile agents
-
oct.
-
L. Tong, Q. Zhao, and S. Adireddy, "Sensor networks with mobile agents," in Military Communications Conference, MILCOM 2003, IEEE, vol. 1, oct. 2003, pp. 688-693.
-
(2003)
Military Communications Conference, MILCOM 2003, IEEE
, vol.1
, pp. 688-693
-
-
Tong, L.1
Zhao, Q.2
Adireddy, S.3
-
5
-
-
35148861085
-
Distributed detection in the presence of byzantine attack in large wireless sensor networks
-
S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of byzantine attack in large wireless sensor networks," in Military Communications Conference, MILCOM 2006, IEEE, oct. 2006, pp. 1-4.
-
Military Communications Conference, MILCOM 2006, IEEE, Oct. 2006
, pp. 1-4
-
-
Marano, S.1
Matta, V.2
Tong, L.3
-
6
-
-
37849186492
-
Sensor networks with mobile access: Energy and capacity considerations
-
nov.
-
G. Mergen, Z. Qing, and L. Tong, "Sensor networks with mobile access: Energy and capacity considerations," IEEE Transactions on Communications, vol. 54, no. 11, pp. 2033-2044, nov. 2006.
-
(2006)
IEEE Transactions on Communications
, vol.54
, Issue.11
, pp. 2033-2044
-
-
Mergen, G.1
Qing, Z.2
Tong, L.3
-
7
-
-
27544460639
-
-
Technical report version 1, mar.
-
B. Awerbuch, R. Curtmola, H. D., N.-R. C., and R. H., "Mitigating byzantine attacks in ad hoc wireless networks," Technical report version 1, mar. 2004.
-
(2004)
Mitigating Byzantine Attacks in Ad Hoc Wireless Networks
-
-
Awerbuch, B.1
Curtmola, R.2
D, H.3
C, N.-R.4
H, R.5
-
8
-
-
77953712316
-
On phy-layer security of cognitive radio: Collaborative sensing under malicious attacks
-
mar.
-
H. Wang, L. Lightfoot, and T. Li, "On phy-layer security of cognitive radio: Collaborative sensing under malicious attacks," 2010 44th Annual Conference on Information Sciences and Systems (CISS), pp. 1 -6, mar. 2010.
-
(2010)
2010 44th Annual Conference on Information Sciences and Systems (CISS)
, pp. 1-6
-
-
Wang, H.1
Lightfoot, L.2
Li, T.3
-
9
-
-
80051614077
-
Cooperative sensing in cognitive networks under malicious attack
-
M. Abdelhakim, L. Zhang, J. Ren, and T. Li, "Cooperative sensing in cognitive networks under malicious attack," in IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), 2011, pp. 3004-3007.
-
IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), 2011
, pp. 3004-3007
-
-
Abdelhakim, M.1
Zhang, L.2
Ren, J.3
Li, T.4
-
11
-
-
77951594186
-
Catchit: Detect malicious nodes in collaborative spectrum sensing
-
W. Wang, H. Li, Y. Sun, and Z. Han, "Catchit: Detect malicious nodes in collaborative spectrum sensing," in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 2009, pp. 1-6.
-
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 2009
, pp. 1-6
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
|