-
1
-
-
84869438107
-
A DOS attack intrusion detection and inhibition technique for wireless computer networks
-
July
-
Salem M., Sarhan A., Abu-Bakr M., "A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks", ICGST- CNIR, Volume 7, No.1, July 2007.
-
(2007)
ICGST- CNIR
, vol.7
, Issue.1
-
-
Salem, M.1
Sarhan, A.2
Abu-Bakr, M.3
-
2
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Urbana- Champaign, IL, USA, May
-
Xu W., Trappe W., Zhang Y., Wood T., "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks", In Proceedings of the Sixth ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc), Urbana- Champaign, IL, USA, PP:25-28, May 2005.
-
(2005)
Proceedings of the Sixth ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc)
, pp. 25-28
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
3
-
-
84874349994
-
Towards secure low rate wireless personal area networks
-
Jun
-
Jianliang Zheng, Myung J. Lee, Michael Anshel, "Towards Secure Low Rate Wireless Personal Area Networks "IEEE Transactions on Mobile Computing, Volume. 20, No. 20, Jun 2010.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.20
, Issue.20
-
-
Zheng, J.1
Lee, M.J.2
Anshel, M.3
-
4
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4- based wireless networks
-
USA, Jun
-
Anthony D. Wood, John A. Stankovic, and Gang Zhou, "DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4- based Wireless Networks, " IEEE conference on SECON, USA Volume 18, No 21, pp: 60-69, Jun 2007.
-
(2007)
IEEE Conference on SECON
, vol.18
, Issue.21
, pp. 60-69
-
-
Wood, A.D.1
Stankovic, J.A.2
Zhou, G.3
-
6
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
Nov
-
W. Xu, K. Ma, W. Trappe and Y. Zhang, "Jamming sensor networks: Attack and defense strategies", IEEE Network, volume.20, No.3, pp.41-47, Nov 2006.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
7
-
-
84860422571
-
Survey on survival approaches in wireless network against jamming attack
-
Aug
-
Faraz Ahsan, Ali Zahir, Sajjad Mohsin, Khalid Hussain "Survey on Survival Approaches in Wireless Network Against Jamming Attack"JATIT, Volume 30, No.1, pp:55-67, Aug 2011.
-
(2011)
JATIT
, vol.30
, Issue.1
, pp. 55-67
-
-
Ahsan, F.1
Zahir, A.2
Mohsin, S.3
Hussain, K.4
-
9
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
David R. Raymond and Scott F. Midkif. "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses", IEEE conference on Pervasive Computing, Volume 7, No.1, pp: 74-81, 2008.
-
(2008)
IEEE Conference on Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkif, S.F.2
-
10
-
-
84978761501
-
Security in bluetooth, RFID and wireless sensor network
-
ACM 978-1-4503, Feb
-
Saroj Kumar Panigraphy, Sanjay Kumar jena "Security in Bluetooth, RFID and Wireless Sensor Network", ICCCS' 11, ACM 978-1-4503, Feb 2011.
-
(2011)
ICCCS' 11
-
-
Panigraphy, S.K.1
Jena, S.K.2
-
11
-
-
70249089094
-
A proactive wireless self-protection system
-
New York, NY, USA, ACM, July
-
Samer Fayssal, Youssif Alnashif, Byoung Kim, and Salim Hariri, "A proactive wireless self-protection system, " in ICPS 08: Proceedings of the 5th international conference on Pervasive services, New York, NY, USA PP-11-20, ACM, July 2008.
-
(2008)
ICPS 08: Proceedings of the 5th International Conference on Pervasive Services
, pp. 20
-
-
Fayssal, S.1
Alnashif, Y.2
Kim, B.3
Hariri, S.4
-
13
-
-
0242365677
-
Designing power aware self-reconfiguring topology for mobile wireless personal area network using fuzzy logic
-
Aug
-
Qilian Liang "Designing power Aware self-reconfiguring Topology for mobile Wireless Personal Area Network Using Fuzzy Logic" IEEE transactions on Systems, man and cybernetics, Volume 33, No 3, Aug 2003.
-
(2003)
IEEE Transactions on Systems, Man and Cybernetics
, vol.33
, Issue.3
-
-
Liang, Q.1
-
14
-
-
33747378828
-
Jamming attack detection and countermeasures in wireless sensor network using and system
-
Orlando, May
-
R. Muraleedharan and L.A. Osadciw, "Jamming attack detection and countermeasures in wireless sensor network using And System" SPIE Defense and Security, Orlando, May 2006.
-
(2006)
SPIE Defense and Security
-
-
Muraleedharan, R.1
Osadciw, L.A.2
-
17
-
-
34047207444
-
Analysis of the contention access period of IEEE 802.15.4 MAC
-
I. Ramachandran, A. K. Das and S. Roy, "Analysis of the contention access period of IEEE 802.15.4 MAC", Journal of ACM Transactions on Sensor Networks, volume.3, No.1, 2007.
-
(2007)
Journal of ACM Transactions on Sensor Networks
, vol.3
, Issue.1
-
-
Ramachandran, I.1
Das, A.K.2
Roy, S.3
-
18
-
-
50649091323
-
Man-in-the-middle attacks on Bluetooth: A comparative analysis, a novel attack, and countermeasures
-
March
-
Haataja, K.M.J, Hypponen, K "Man-In-The-Middle attacks on Bluetooth: A comparative analysis, a novel attack, and countermeasures" IEEE 3rd International Symposium on Communications, Control and Signal Processing, pp: 1096-1102, March 2008.
-
(2008)
IEEE 3rd International Symposium on Communications, Control and Signal Processing
, pp. 1096-1102
-
-
Haataja, K.M.J.1
Hypponen, K.2
-
19
-
-
74549219772
-
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
-
Jan.
-
Haataja K, Toivanen P "Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures" IEEE Transactions on wireless communication, Volume 9, No 1, pp: 384-392, Jan 2010.
-
(2010)
IEEE Transactions on Wireless Communication
, vol.9
, Issue.1
, pp. 384-392
-
-
Haataja, K.1
Toivanen, P.2
-
22
-
-
79951737949
-
A triangle module operator and fuzzy logic based handoff algorithm for heterogeneous wireless network
-
ISBN: 978-1-4244-6868-3, Jan.
-
Sheng Lie, Tang Liangrui "A Triangle module operator and Fuzzy Logic Based Handoff Algorithm for Heterogeneous Wireless Network" 12th IEEE International Conference on Communication Technology, ISBN: 978-1-4244-6868-3, PP 448-451, Jan 2011.
-
(2011)
12th IEEE International Conference on Communication Technology
, pp. 448-451
-
-
Sheng, L.1
Tang, L.2
-
23
-
-
51849119602
-
Defending wireless sensor network from radio interference through channel adaptation
-
Aug
-
Xu W Trappe, Zhang Y "Defending Wireless Sensor Network from radio interference through channel adaptation" ACM Transaction on Sensor Network, Volume 4, No 4, pp:18-33, Aug 2009.
-
(2009)
ACM Transaction on Sensor Network
, vol.4
, Issue.4
, pp. 18-33
-
-
Xu, W.T.1
Zhang, Y.2
|