-
2
-
-
59249100315
-
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks
-
Li B, Batten L. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks. Journal of Network and Computer Applications 2009; 32:377-387.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 377-387
-
-
Li, B.1
Batten, L.2
-
3
-
-
78649332013
-
A novel node level security policy framework for wireless sensor networks
-
Claycomb WR, Shin D. A novel node level security policy framework for wireless sensor networks. Journal of Network and Computer Applications 2011; 34:418-428.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 418-428
-
-
Claycomb, W.R.1
Shin, D.2
-
4
-
-
84856138141
-
-
Comparison of authenticated-encryption schemes in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany
-
Simplicio MA Jr., De Oliveira BT, Barreto PSLM, Margi CB, Carvalho TCMB, Naslund M. Comparison of authenticated-encryption schemes in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, 2011.
-
(2011)
-
-
Simplicio Jr., M.A.1
De Oliveira, B.T.2
Barreto, P.S.L.M.3
Margi, C.B.4
Carvalho, T.C.M.B.5
Naslund, M.6
-
5
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
Hu F, Sharma N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 2005; 3:69-89.
-
(2005)
Ad Hoc Networks
, vol.3
, pp. 69-89
-
-
Hu, F.1
Sharma, N.2
-
6
-
-
24644440576
-
-
A cluster-based energy balancing scheme in heterogeneous wireless sensor networks. Proceedings of International Conference on Networking, April
-
Ai J, Turgut D, Bölöni L. A cluster-based energy balancing scheme in heterogeneous wireless sensor networks. Proceedings of International Conference on Networking, April 2005; 467-474.
-
(2005)
, pp. 467-474
-
-
Ai, J.1
Turgut, D.2
Bölöni, L.3
-
7
-
-
0033877788
-
-
Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the IEEE Hawaii International Conference on System Sciences
-
Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the IEEE Hawaii International Conference on System Sciences, 2000.
-
(2000)
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
8
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: a comprehensive overview
-
Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53:2022-2037.
-
(2009)
Computer Networks
, vol.53
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
9
-
-
10944266504
-
HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks
-
Younis O, Fahmy S. HEED: a hybrid, energy-efficient distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3(4):366-379.
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
10
-
-
83055177189
-
-
Fast and flexible unsupervised clustering algorithm based on ultrametric properties. Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, USA
-
Fouchal S, Lavallée I. Fast and flexible unsupervised clustering algorithm based on ultrametric properties. Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, USA, 2011.
-
(2011)
-
-
Fouchal, S.1
Lavallée, I.2
-
11
-
-
84856207437
-
-
Efficient temporal compression in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany
-
Liang Y. Efficient temporal compression in wireless sensor networks, 36th Annual IEEE Conference on Local Computer Networks, Bonn, Germany, 2011.
-
(2011)
-
-
Liang, Y.1
-
12
-
-
62649122300
-
-
Detecting denial of service attacks in sensor networks. Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS'07)
-
Lai GH, Chen CM. Detecting denial of service attacks in sensor networks. Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security (CNIS'07); 109-115.
-
-
-
Lai, G.H.1
Chen, C.M.2
-
13
-
-
84875659362
-
-
Dynamic solution for detecting denial of service attacks in wireless sensor networks. ICC June .
-
Guechari M, Mokdad L, Tan S. Dynamic solution for detecting denial of service attacks in wireless sensor networks. ICC June 2012.
-
(2012)
-
-
Guechari, M.1
Mokdad, L.2
Tan, S.3
-
14
-
-
77954002155
-
Energy efficient and QoS aware medium access control for wireless sensor networks
-
Yahya B, Ben-Othman J. Energy efficient and QoS aware medium access control for wireless sensor networks. Concurrency and Computation: Practice and Experience 2010; 22(10):1252-1266.
-
(2010)
Concurrency and Computation: Practice and Experience
, vol.22
, Issue.10
, pp. 1252-1266
-
-
Yahya, B.1
Ben-Othman, J.2
-
15
-
-
79955784505
-
Energy efficient and QoS based routing protocol for wireless sensor networks
-
Ben-Othman J, Yahya B. Energy efficient and QoS based routing protocol for wireless sensor networks. Journal of Parallel and Distributed Computing 2010; 70(8):849-857.
-
(2010)
Journal of Parallel and Distributed Computing
, vol.70
, Issue.8
, pp. 849-857
-
-
Ben-Othman, J.1
Yahya, B.2
-
16
-
-
64749095465
-
-
A Bayesian game approach for preventing DoS attacks in wireless sensor networks. International Conference on Communications and Mobile Computing
-
Mohi M, Movaghar A, Zadeh PM. A Bayesian game approach for preventing DoS attacks in wireless sensor networks. International Conference on Communications and Mobile Computing, 2009.
-
(2009)
-
-
Mohi, M.1
Movaghar, A.2
Zadeh, P.M.3
-
17
-
-
84877932069
-
Distributed Detection of Node Capture Attacks in Wireless Networks
-
In, Chinh HD, Tan YK (eds). Available from:
-
Ho J-W. Distributed Detection of Node Capture Attacks in Wireless Networks. In Smart Wireless Sensor Networks, Chinh HD, Tan YK (eds). 2010. Available from: http://www.intechopen.com/books/smart-wireless-sensor-networks/distributed-detection-of-node-capture-attacks-in-wireless-sensor-networks
-
(2010)
Smart Wireless Sensor Networks
-
-
Ho, J.-W.1
-
18
-
-
77955715403
-
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks
-
Misra S, Krishna PV, Abraham KI, Sasikumar N, Fredun S. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Computers and Mathematics with Applications 2010; 60:294-306.
-
(2010)
Computers and Mathematics with Applications
, vol.60
, pp. 294-306
-
-
Misra, S.1
Krishna, P.V.2
Abraham, K.I.3
Sasikumar, N.4
Fredun, S.5
-
19
-
-
33750134647
-
-
Mobile Computing and Networking: Rome, Italy
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. Mobile Computing and Networking: Rome, Italy, 2001.
-
(2001)
SPINS: security protocols for sensor networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
34547913472
-
SecLEACH - on the security of clustered sensor networks
-
Oliveira LB, Ferreirac A, Vilaça MA, et al. SecLEACH - on the security of clustered sensor networks. Signal Processing 2007; 87:2882-2895.
-
(2007)
Signal Processing
, vol.87
, pp. 2882-2895
-
-
Oliveira, L.B.1
Ferreirac, A.2
Vilaça, M.A.3
-
22
-
-
77955308709
-
Denial of service attack-resistant flooding authentication in wireless sensor networks
-
Son JH, Luo H, Seo SW. Denial of service attack-resistant flooding authentication in wireless sensor networks. Computer Communications 2010; 33:1531-1542.
-
(2010)
Computer Communications
, vol.33
, pp. 1531-1542
-
-
Son, J.H.1
Luo, H.2
Seo, S.W.3
-
23
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks
-
Hsieh MY, Huang YM, Chao HC. Adaptive security design with malicious node detection in cluster-based sensor networks. Computer Communications 2007; 30:2385-2400.
-
(2007)
Computer Communications
, vol.30
, pp. 2385-2400
-
-
Hsieh, M.Y.1
Huang, Y.M.2
Chao, H.C.3
-
24
-
-
84962853206
-
-
Low energy adaptive clustering hierarchy with deterministic cluster-head selection. Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks, Stockholm, Sweden
-
Handy MJ, Haase M, Timmerman D. Low energy adaptive clustering hierarchy with deterministic cluster-head selection. Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks, Stockholm, Sweden, 2002.
-
(2002)
-
-
Handy, M.J.1
Haase, M.2
Timmerman, D.3
-
25
-
-
84878629995
-
-
HASL: an expressive language for statistical verification of stochastic models. Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), Cachan, France
-
Ballarini P, Djafr H, Duflot M, Haddad S, Pekergin N. HASL: an expressive language for statistical verification of stochastic models. Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (ValueTOOLS11), Cachan, France, 2011.
-
(2011)
-
-
Ballarini, P.1
Djafr, H.2
Duflot, M.3
Haddad, S.4
Pekergin, N.5
-
26
-
-
84875639698
-
-
The Network Simulator NS-2
-
The Network Simulator NS-2. http://www.isi.edu/nsnam/ns/
-
-
-
-
27
-
-
0003652825
-
-
John Wiley & Sons
-
Ajmone Marsan M, Balbo G, Conte G, Donatelli S, Franceschinis G. Modelling with Generalized Stochastic Petri Nets. John Wiley & Sons, 1995. http://www.di.unito.it/~greatspn/GSPN-Wiley/
-
(1995)
Modelling with Generalized Stochastic Petri Nets
-
-
Ajmone Marsan, M.1
Balbo, G.2
Conte, G.3
Donatelli, S.4
Franceschinis, G.5
-
29
-
-
84875226332
-
-
Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, September DOI: 10.1002/cpe.1804.
-
Fouchal H, Habbas Z. Distributed backtracking algorithm based on tree decomposition over wireless sensor networks. Concurrency and Computation: Practice and Experience, September 2011. DOI: 10.1002/cpe.1804.
-
(2011)
-
-
Fouchal, H.1
Habbas, Z.2
-
30
-
-
84871948539
-
IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s
-
In Wiley, In press.
-
Ben-Othman J, Saavedra Benitez Y. IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s. In Concurrency and Computation: Practice and Experience. Wiley, In press.
-
Concurrency and Computation: Practice and Experience
-
-
Ben-Othman, J.1
Saavedra Benitez, Y.2
-
31
-
-
78449283412
-
-
Anomaly detection with wireless sensor networks. The 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), IEEE CS Press, Cambridge, MA, USA, July .
-
Dessart N, Fouchal H, Hunel P, Vidot N. Anomaly detection with wireless sensor networks. The 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), IEEE CS Press, Cambridge, MA, USA, July 2010.
-
(2010)
-
-
Dessart, N.1
Fouchal, H.2
Hunel, P.3
Vidot, N.4
-
32
-
-
84875676496
-
-
A low energy consumption MAC protocol for WSN. IEEE ICC 2012, Ottawa, Canada, June .
-
Bernard T, Fouchal H. A low energy consumption MAC protocol for WSN. IEEE ICC 2012, Ottawa, Canada, June 2012.
-
(2012)
-
-
Bernard, T.1
Fouchal, H.2
-
33
-
-
34548060449
-
Stochastic model checking
-
In, LNCS (Tutorial Volume): Bertinoro, Italy, Vol. 4486
-
Kwiatkowska M, Norman G, Parker D. Stochastic model checking, In Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), LNCS (Tutorial Volume): Bertinoro, Italy, Vol. 4486, 2007.
-
(2007)
Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07)
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
|