-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Networks, 38: 393-422.
-
(2002)
Comput. Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
51549087644
-
Wireless sensor networks: Applications and challenges
-
February 12-15, 2007, Sharjah, UAE.
-
Alemdar, A. and M. Ibnkahla, 2007. Wireless sensor networks: Applications and challenges. Proceedings of the 9th International Symposium on Signal Processing and Its Applications, February 12-15, 2007, Sharjah, UAE., pp: 1-6.
-
(2007)
Proceedings of the 9th International Symposium on Signal Processing and its Applications
, pp. 1-6
-
-
Alemdar, A.1
Ibnkahla, M.2
-
3
-
-
84860450395
-
Wireless sensor intrusion detection system based on the theory of evidence
-
December 24-26, 2011, Harbin, China
-
Chang, Y. and F. Liu, 2011. Wireless sensor intrusion detection system based on the theory of evidence. Proceedings of the International Conference on Computer Science and Network Technology, Volume 4, December 24-26, 2011, Harbin, China, pp: 2811-2814.
-
(2011)
Proceedings of the International Conference on Computer Science and Network Technology
, vol.4
, pp. 2811-2814
-
-
Chang, Y.1
Liu, F.2
-
4
-
-
23044483906
-
New weighting factors assignment of evidence theory based one vidence distance
-
Chen, L., W. Shi and F. Du, 2005. New weighting factors assignment of evidence theory based one vidence distance. J. Syst. Eng. Electron., 16: 273-278.
-
(2005)
J. Syst. Eng. Electron.
, vol.16
, pp. 273-278
-
-
Chen, L.1
Shi, W.2
Du, F.3
-
5
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
Dempster, A.P., 1967. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat., 38: 325-339.
-
(1967)
Ann. Math. Stat.
, vol.38
, pp. 325-339
-
-
Dempster, A.P.1
-
6
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
Depren, O., M. Topallar, E. Anarim and M.K. Ciliz, 2005. An intelligent Intrusion Detection System (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl, 29: 713-722.
-
(2005)
Expert Syst. Appl
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
7
-
-
77954344352
-
Wireless intrusion detection system using a lightweight agent
-
April 23-25, 2010, Bangkok, Thailand
-
Haddadi, F. and M.A. Sarram, 2010. Wireless intrusion detection system using a lightweight agent. Proceedings of the 2nd International Conference on Computer and Network Technology, April 23-25, 2010, Bangkok, Thailand, pp: 84-87.
-
(2010)
Proceedings of the 2nd International Conference on Computer and Network Technology
, pp. 84-87
-
-
Haddadi, F.1
Sarram, M.A.2
-
8
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Mar. 30-Apr. 3, IEEE Publication
-
Hu, Y.C., A. Perrig and D.B. Johnson, 2003. Packet leashes: A defense against wormhole attacks in wireless networks. Proceeding of the INFOCOM, 22nd Annual Joint Conference IEEE Computer and Communication Society, Mar. 30-Apr. 3, IEEE Publication, pp: 1976-1986.
-
(2003)
Proceeding of the INFOCOM, 22nd Annual Joint Conference IEEE Computer and Communication Society
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
78751680777
-
An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks
-
December 16-18, 2010, Sanya, China
-
Ju, L., H. Li, Y. Liu, W. Xue, K. Li and Z. Chi, 2010. An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks. Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, December 16-18, 2010, Sanya, China, pp: 1-6.
-
(2010)
Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications
, pp. 1-6
-
-
Ju, L.1
Li, H.2
Liu, Y.3
Xue, W.4
Li, K.5
Chi, Z.6
-
10
-
-
77951178321
-
Adaptive weighted fusion algorithm for monitoring system of forest fire based on wireless sensor networks
-
January 22-24, 2010, Sanya, Hainan, China
-
Lu, G. and W. Xue, 2010. Adaptive weighted fusion algorithm for monitoring system of forest fire based on wireless sensor networks. Proceedings of the 2nd International Conference on Computer Modeling and Simulation, Volume 4, January 22-24, 2010, Sanya, Hainan, China, pp: 414-417.
-
(2010)
Proceedings of the 2nd International Conference on Computer Modeling and Simulation
, vol.4
, pp. 414-417
-
-
Lu, G.1
Xue, W.2
-
11
-
-
84856640682
-
Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks
-
Moon, S.Y. and T.H. Cho, 2009. Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. Int. J. Comput. Sci. Network Secur., 9: 118-122.
-
(2009)
Int. J. Comput. Sci. Network Secur.
, vol.9
, pp. 118-122
-
-
Moon, S.Y.1
Cho, T.H.2
-
12
-
-
84880052885
-
Malicious node detection in wireless sensor networks
-
April 26-30, 2004, Santa Fe, New Mexico, USA
-
Ribeiro, W., T.H. Palua and P. Junior, 2004. Malicious node detection in wireless sensor networks. Proceedings of the 18th International Parallel and Distributed Processing Symposium, April 26-30, 2004, Santa Fe, New Mexico, USA.
-
(2004)
Proceedings of the 18th International Parallel and Distributed Processing Symposium
-
-
Ribeiro, W.1
Palua, T.H.2
Junior, P.3
-
14
-
-
77949592506
-
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
-
Communications and Signal Processing, December 8-10, 2009, Macau, China
-
Tumrongwittayapak, C. and R. Varakulsiripunth, 2009. Detecting sinkhole attack and selective forwarding attack in wireless sensor networks. Proceedings of the 7th International Conference on Information, Communications and Signal Processing, December 8-10, 2009, Macau, China, pp: 1-5.
-
(2009)
Proceedings of the 7th International Conference on Information
, pp. 1-5
-
-
Tumrongwittayapak, C.1
Varakulsiripunth, R.2
-
15
-
-
84861633844
-
On the topology of wireless sensor networks
-
March 25-30, 2012, Orlando, FL., USA.
-
Yang, S., X. Wang and L. Fu, 2012. On the topology of wireless sensor networks. Proceedings of the IEEE INFOCOM, March 25-30, 2012, Orlando, FL., USA., pp: 2095-2103.
-
(2012)
Proceedings of the IEEE INFOCOM
, pp. 2095-2103
-
-
Yang, S.1
Wang, X.2
Fu, L.3
-
16
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
August 6-11, 2000, Boston, MA., USA.
-
Zhang, G.Y. and W. Lee, 2000. Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 275-283.
-
(2000)
Proceedings of the 6th International Conference on Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, G.Y.1
Lee, W.2
-
17
-
-
70350692585
-
Security wireless sensor networks: A survey
-
Zhou, Y., Y. Fang and Y. Zhang, 2008. Security wireless sensor networks: A survey. Commun. Surv. Tutorials, 10: 6-28.
-
(2008)
Commun. Surv. Tutorials
, vol.10
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
|