-
1
-
-
74349119972
-
Business opportunities and considerations on wireless mesh networks
-
IEEE
-
G. Vasilakis, G. Perantinos, I. G. Askoxylakis, N. Mechin, V. Spitadakis, and A. Traganitis. Business opportunities and considerations on wireless mesh networks. In Proceedings of the 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM '09). IEEE, 2009.
-
(2009)
Proceedings of the 10th, IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WOWMOM '09)
-
-
Vasilakis, G.1
Perantinos, G.2
Askoxylakis, I.G.3
Mechin, N.4
Spitadakis, V.5
Traganitis, A.6
-
8
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
ACM
-
C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. N. Levitt. A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks (SASN '03). ACM, 2003.
-
(2003)
Proceedings of the 1st, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
10
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
IEEE
-
G. Vigna, S. Gwalani, K. Srinivasan, E. M. Belding-Royer, and R. A. Kemmerer. An intrusion detection tool for AODV-based ad hoc wireless networks. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04). IEEE, 2004.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC '04)
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.M.4
Kemmerer, R.A.5
-
11
-
-
79959520290
-
On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks
-
IEEE. Aug
-
R. V. Boppana and X. Su. On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks. Transactions on Mobile Computing, IEEE, Aug 2011.
-
(2011)
Transactions on Mobile Computing
-
-
Boppana, R.V.1
Su, X.2
-
12
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
IEEE, May-Jun
-
H. Yih-Chun and A. Perrig. A survey of secure wireless ad hoc routing. Security and Privacy, IEEE, May-Jun 2004.
-
(2004)
Security and Privacy
-
-
Yih-Chun, H.1
Perrig, A.2
-
13
-
-
36849079903
-
A survey of routing attacks in mobile ad hoc networks
-
IEEE, Oct
-
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Wireless Communications, IEEE, Oct 2007.
-
(2007)
Wireless Communications
-
-
Kannhavong, B.1
Nakayama, H.2
Nemoto, Y.3
Kato, N.4
Jamalipour, A.5
-
15
-
-
79251514863
-
-
IEEE Standard 802 Part 11 Amendment 10
-
IEEE Standard 802 Part 11 Amendment 10: Mesh Networking. 2011.
-
(2011)
Mesh Networking
-
-
-
16
-
-
0035402083
-
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
-
Jul
-
Y. Guan, X. Fu, D. Xuan, P. U. Shenoy, R. Bettati, and W. Zhao. NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Jul 2001.
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Zhao, W.6
-
17
-
-
79955699013
-
Cy-mag3d: A simple and miniature climbing robot with advance mobility in ferromagnetic environment
-
Emerald Group
-
F. Rochat, P. Schöneich, B. Lüthi, H. Bleuler, R. Moser, and F. Mondada. Cy-mag3d: a simple and miniature climbing robot with advance mobility in ferromagnetic environment. Industrial Robot: An International Journal, Emerald Group, 2011.
-
(2011)
Industrial Robot, An International Journal
-
-
Rochat, F.1
Schöneich, P.2
Lüthi, B.3
Bleuler, H.4
Moser, R.5
Mondada, F.6
-
18
-
-
78650352346
-
Highly compact robots for inspection of power plants
-
IEEE
-
G. Caprari, A. Breitenmoser, W. Fischer, C. Hürzeler, F. Tâche, R. Siegwart, P. Schöneich, F. Rochat, F. Mondada, and R. Moser. Highly compact robots for inspection of power plants. In Proceedings of the 1st International Conference on Applied Robotics for the Power Industry (CARPI). IEEE, 2010.
-
(2010)
Proceedings of the 1st International Conference on Applied Robotics for the Power Industry (CARPI)
-
-
Caprari, G.1
Breitenmoser, A.2
Fischer, W.3
Hürzeler, C.4
Tâche, F.5
Siegwart, R.6
Schöneich, P.7
Rochat, F.8
Mondada, F.9
Moser, R.10
-
19
-
-
84866103143
-
On gas leak detection of pressurised components by using thermograms and pattern recognition algorithms
-
European Commission, Joint Research Center, Institute for Energy
-
W. Baetz, A. Kroll, and S. Soldan. On gas leak detection of pressurised components by using thermograms and pattern recognition algorithms. In Proceedings of the 8th International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components. European Commission, Joint Research Center, Institute for Energy, 2010.
-
(2010)
Proceedings of the 8th International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components
-
-
Baetz, W.1
Kroll, A.2
Soldan, S.3
-
20
-
-
84871157998
-
-
Last accessed on February 11, 2013
-
open80211s project. online. http://http://open80211s.org, Last accessed on February 11, 2013.
-
Open80211s Project
-
-
-
21
-
-
84871105899
-
-
Last accessed on February 11, 2013
-
Alix Board 3D2 Wiki. online. http://goo.gl/fTzhO, Last accessed on February 11, 2013.
-
Alix Board 3D2 Wiki
-
-
-
22
-
-
4544231612
-
Real-time problem determination in distributed systems using active probing
-
IEEE
-
I. Rish, M. Brodie, N. Odintsova, M. Sheng, and G. Grabarnik. Real-time problem determination in distributed systems using active probing. In IEEE/IFIP Network Operations and Management Symposium (NOMS). IEEE, 2004.
-
(2004)
IEEE/ IFIP Network Operations and Management Symposium (NOMS)
-
-
Rish, I.1
Brodie, M.2
Odintsova, N.3
Sheng, M.4
Grabarnik, G.5
-
23
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Sep
-
Y. Zhang, W. Lee, and Y. Huang. Intrusion detection techniques for mobile wireless networks. Wirel. Netw., 9(5), Sep 2003.
-
(2003)
Wirel. Netw
, vol.9
, Issue.5
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
24
-
-
33750370441
-
DEMEM: Distributed evidence-driven message exchange intrusion detection model for manet
-
D. Zamboni and C. Kruegel, editors, Springer Berlin-Heidelberg
-
C. Tseng, S. Wang, C. Ko, and K. Levitt. DEMEM: Distributed evidence-driven message exchange intrusion detection model for manet. In D. Zamboni and C. Kruegel, editors, Recent Advances in Intrusion Detection, volume 4219 of Lecture Notes in Computer Science. Springer Berlin-Heidelberg, 2006.
-
(2006)
Recent Advances in Intrusion Detection Volume 4219 of Lecture Notes in Computer Science
-
-
Tseng, C.1
Wang, S.2
Ko, C.3
Levitt, K.4
|