-
2
-
-
78951488729
-
Prevention of DoS attack in sensor networks using repeated game theory
-
Citeseer
-
A. Agah, M. Asadi, and S. Das. Prevention of DoS attack in sensor networks using repeated game theory. In Proc. of the Int'l Conf. on Wireless Networks, pp. 29-36, Citeseer, 2006.
-
(2006)
Proc. of the Int'l Conf. on Wireless Networks
, pp. 29-36
-
-
Agah, A.1
Asadi, M.2
Das, S.3
-
3
-
-
24144441735
-
Preventing DoS attack in sensor networks: A game theoretic approach
-
A. Agah, K. Basu, and S. Das. Preventing DoS attack in sensor networks: a game theoretic approach. In Proc. of IEEE Int'l Conf. on Communications, volume 5, pp. 3218-3222, 2005.
-
(2005)
Proc. of IEEE Int'l Conf. on Communications
, vol.5
, pp. 3218-3222
-
-
Agah, A.1
Basu, K.2
Das, S.3
-
4
-
-
2442604387
-
A game theory based approach for security in wireless sensor networks
-
A. Agah, S. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In Proc. 2004 IEEE Int'l Conf. on Performance, Computing, and Communications, pp. 259-263, 2004.
-
(2004)
Proc. 2004 IEEE Int'l Conf. on Performance, Computing, and Communications
, pp. 259-263
-
-
Agah, A.1
Das, S.2
Basu, K.3
-
6
-
-
77950582812
-
Data Warehousing Special Report: Data quality and the bottom line
-
May
-
W. Eckerson. Data Warehousing Special Report: Data quality and the bottom line. Applications Development Trends May, 2002.
-
(2002)
Applications Development Trends
-
-
Eckerson, W.1
-
13
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
IEEE Computer Society Washington, DC, USA
-
A. Liu and P. Ning. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proc. of the 7th Int'l Conf. on Information Processing in Sensor Networks, pp. 245-256. IEEE Computer Society Washington, DC, USA, 2008.
-
(2008)
Proc. of the 7th Int'l Conf. on Information Processing in Sensor Networks
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
15
-
-
35348897342
-
Minisec: A secure sensor network communication architecture
-
ACM
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor. Minisec: a secure sensor network communication architecture. In Proc. of the 6th Int'l Symposium on Information Processing in Sensor Networks, pp. 479-488. ACM, 2007.
-
(2007)
Proc. of the 6th Int'l Symposium on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
16
-
-
65249138169
-
New adversary and new threats: Security in unattended sensor networks
-
D. Ma, C. Soriente, and G. Tsudik. New adversary and new threats: security in unattended sensor networks. Network, IEEE, 23(2):43-48, 2009.
-
(2009)
Network, IEEE
, vol.23
, Issue.2
, pp. 43-48
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
17
-
-
53249147143
-
A survey of game-theoretic approaches in wireless sensor networks
-
R. Machado and S. Tekinay. A survey of game-theoretic approaches in wireless sensor networks. Computer Networks, 52(16):3047-3061, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.16
, pp. 3047-3061
-
-
Machado, R.1
Tekinay, S.2
-
18
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
J. McCune, E. Shi, A. Perrig, and M. Reiter. Detection of denial-of-message attacks on sensor network broadcasts. In Proc. of 2005 IEEE Symposium on Security and Privacy, pp. 64-78, 2005.
-
(2005)
Proc. of 2005 IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
McCune, J.1
Shi, E.2
Perrig, A.3
Reiter, M.4
-
19
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler. SPINS: Security protocols for sensor networks. Wireless networks, 8(5):521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
20
-
-
79951761309
-
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
-
Sydney, Australia, December
-
L.-A. Tang, X. Yu, S. Kim, J. Han, C.-C. Hung and W.-C. Peng Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems. In Proc. of Intl. Conference on Data Mining (ICDM), pp 1079-1084, Sydney, Australia, December 2010.
-
(2010)
Proc. of Intl. Conference on Data Mining (ICDM)
, pp. 1079-1084
-
-
Tang, L.-A.1
Yu, X.2
Kim, S.3
Han, J.4
Hung, C.-C.5
Peng, W.-C.6
|