-
1
-
-
77958107750
-
Comprehensive Evaluation of the IEEE 802.15.4 MAC Layer Performance with Retransmissions
-
October
-
Azahdeh Faridi et al, "Comprehensive Evaluation of the IEEE 802.15.4 MAC Layer Performance With Retransmissions," IEEE Transactions on Vehicular Technology, Vol.59, No.8, October 2010, pp. 3917-3932.
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, Issue.8
, pp. 3917-3932
-
-
Faridi, A.1
-
3
-
-
71649094416
-
A survey of Attack and Defense Techniques for Reputation Systems
-
K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of Attack and Defense Techniques for Reputation Systems," ACM Computing Surveys, Vol 41, Issue 4, 2009.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.4
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
5
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Chris Karlof and David Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks Journal, Vol.1, Issue 2-3, 2003, pp. 293-315.
-
(2003)
Ad Hoc Networks Journal
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
6
-
-
84976699318
-
The Byzantine Generals Problem
-
July
-
Leslie Lamport, Robert Shostak, and Marshall Pease, "The Byzantine Generals Problem," ACM Transactions on Programming Languages and Systems, Vol. 4, No. 3, July 1982, pp. 382-401.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
7
-
-
42649129419
-
Future Trust Management Framework for Mobile Ad Hoc Networks
-
Jie Li, Ruidong Li, and Jien Kato, "Future Trust Management Framework for Mobile Ad Hoc Networks," IEEE Communication Magazine, Vol 46, Issue 4, 2008, pp.108-114.
-
(2008)
IEEE Communication Magazine
, vol.46
, Issue.4
, pp. 108-114
-
-
Li, J.1
Li, R.2
Kato, J.3
-
8
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks
-
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, "Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks," In Proc. of International Conference on Mobile Computing and Networking (Mobicom), 2000, pp. 255-265.
-
Proc. of International Conference on Mobile Computing and Networking (Mobicom), 2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
9
-
-
48649095029
-
An efficient countermeasure to the selective forwarding attack in wireless sensor network
-
Hung-Min Sun, Chien-Ming Che, and Ying-Chu Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor network," IEEE Region 10 Conference (TENCON), 2007, pp.1-4.
-
IEEE Region 10 Conference (TENCON), 2007
, pp. 1-4
-
-
Sun, H.-M.1
Che, C.-M.2
Hsiao, Y.-C.3
-
10
-
-
56749140937
-
Defense of Trust Management Vulnerabilities in Distributed Networks
-
Lindsay
-
Yan (Lindsay) Sun, Zhu Han, and K. J. Ray Liu, "Defense of Trust Management Vulnerabilities in Distributed Networks," IEEE Communications Magazine, Vol 46, Issue 2, 2008, pp.112-119.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.2
, pp. 112-119
-
-
Sun, Y.1
Han, Z.2
Ray Liu, K.J.3
-
11
-
-
80051521882
-
Trust management in the pervasive computing era
-
July
-
Denis Trček, "Trust management in the pervasive computing era," IEEE Security & Privacy, Vol. 9, No. 4, July 2011, pp. 52-55.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.4
, pp. 52-55
-
-
Trček, D.1
-
12
-
-
67650841852
-
A Note on Trust-Enhanced Security
-
May/June
-
Vijay Varadharajan, "A Note on Trust-Enhanced Security", IEEE Security & Privacy, Vol. 7, Issue 3, May/June 2009, pp. 57-59.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.3
, pp. 57-59
-
-
Varadharajan, V.1
-
13
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
Bin Xiao, Bo Yu, Chuanshan Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," Journal of Parallel and Distributed Computing, 67, 2007, pp. 1218-1230.
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
14
-
-
72449164867
-
Lightweight defense scheme against selective forwarding attacks in wireless sensor networks
-
Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, and Wang Liangmin," Lightweight defense scheme against selective forwarding attacks in wireless sensor networks," Intl. Conf. on Cyber-Enabled Distributed and Knowledge Discovery (CyberC), 2009, pp. 226-232.
-
Intl. Conf. on Cyber-Enabled Distributed and Knowledge Discovery (CyberC), 2009
, pp. 226-232
-
-
Wang, X.-S.1
Zhan, Y.-Z.2
Xiong, S.-M.3
Wang, L.4
-
15
-
-
81455157533
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Elsevier, in press
-
Yanli Yu, Keqiu Li, Wanlei Zhou, and Ping Li, "Trust mechanisms in wireless sensor networks: attack analysis and countermeasures," Journal of Network and Computer Applications, Elsevier, 2011, in press.
-
(2011)
Journal of Network and Computer Applications
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
16
-
-
3042825654
-
Software Protection: Security's Last Stand?
-
Martin R. Stytz and James A. Whitaker, "Software Protection: Security's Last Stand?" IEEE Security & Privacy, Vol 1, Issue 1, 2003, pp. 95-98.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 95-98
-
-
Stytz, M.R.1
Whitaker, J.A.2
-
17
-
-
10944251971
-
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
-
David E. Bakken, Rupa Parameswaran, Douglas M. Blough, Ty J. Palmer, and Andy A. Franz, "Data Obfuscation: Anonymity and Desensitization of Usable Data Sets," IEEE Security & Privacy, Vol 2, Issue 6, 2004, pp. 34-41.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 34-41
-
-
Bakken, D.E.1
Parameswaran, R.2
Blough, D.M.3
Palmer, T.J.4
Franz, A.A.5
-
18
-
-
34548364110
-
Insider Attacker Detection in Wireless Sensor Networks
-
Fang Liu, Xiuzhen Cheng, and Dechang Chen, "Insider Attacker Detection in Wireless Sensor Networks," IEEE International Conf. on Computer Communications (INFOCOM), May 2007, pp. 1937-1945.
-
IEEE International Conf. on Computer Communications (INFOCOM), May 2007
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
19
-
-
79956116601
-
Anomaly detection in wireless sensor networks: A survey
-
Miao Xie, Song Han, Biming Tian, and Sazia Parvin, "Anomaly detection in wireless sensor networks: A survey," Journal of Network and Computer Applications 34, 2011, pp. 1302-1325.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1302-1325
-
-
Xie, M.1
Han, S.2
Tian, B.3
Parvin, S.4
-
20
-
-
49749114376
-
Anomaly Detection in Wireless Sensor Networks
-
Sutharshan Rajasegarar, Christopher Leckie, and Marimuhu Palaniswami, "Anomaly Detection In Wireless Sensor Networks," IEEE Wireless Communications, 2008, pp. 34-40.
-
(2008)
IEEE Wireless Communications
, pp. 34-40
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
-
21
-
-
84864260518
-
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
-
in press
-
Issa Khalil, Saurabh Bagchi, Cristina N. Rotaru, Ness B. Shroff, "UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks," Ad Hoc Networks, in press, 2009.
-
(2009)
Ad Hoc Networks
-
-
Khalil, I.1
Bagchi, S.2
Rotaru, C.N.3
Shroff, N.B.4
-
22
-
-
79956094979
-
Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
-
Y. Challal, A. Ouadjaout, N. Lasla, M. Bagaa, A. Hadjidj, "Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks," Journal of Network and Computer Applications 34, 2011, pp. 1380-1397.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1380-1397
-
-
Challal, Y.1
Ouadjaout, A.2
Lasla, N.3
Bagaa, M.4
Hadjidj, A.5
-
24
-
-
77950866308
-
Trust management systems for wireless sensor networks: Best practices
-
Javier Lopez, Rodrigo Roman, Isaac Agudo, and Carmen Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, Vol 33, 2010, pp.1086-1093.
-
(2010)
Computer Communications
, vol.33
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez-Gago, C.4
-
25
-
-
38349154579
-
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
-
David R. Raymond and Scott F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive computing, 2008, pp. 74-80.
-
(2008)
Pervasive Computing
, pp. 74-80
-
-
Raymond, D.R.1
Midkiff, S.F.2
|