-
1
-
-
84880230102
-
Lidea: A distributed securecomm '08
-
Istanbul, Turkey, September 22-25
-
I. Krontiris, T. Giannetsos, and T. Dimitriou, "Lidea: A distributed SECURECOMM '08: Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, Turkey, September 22-25 2008.
-
(2008)
Fourth International Conference on Security and Privacy for Communication Networks
-
-
Krontiris, I.1
Giannetsos, T.2
Dimitriou, T.3
-
2
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks," in Proc. of IEEEINFOCOM, 2003, pp. 1976-1986, vol.3
-
(2003)
Proc. of IEEEINFOCOM
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
3
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
Security (NDSS 04), San Diego; February
-
L. X. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proc. IEEE Symp. Network and Distributed System, Security (NDSS 04), San Diego; February 2004.
-
(2004)
Proc. IEEE Symp. Network and Distributed System
-
-
Hu, L.X.1
Evans, D.2
-
6
-
-
77958538062
-
An approach towards detection of wormhole attack in sensor networks
-
Prasannajit B, Venkatesh, Anupama S, Vindhykumari K, Subhashini S R, Vinitha G; "An approach towards Detection of Wormhole Attack in Sensor Networks" First International Conference on Integrated Intelligent Computing (ICIIC), 2010, pp. 283-289.
-
(2010)
First International Conference on Integrated Intelligent Computing (ICIIC)
, pp. 283-289
-
-
Prasannajit, B.1
Venkatesh2
Anupama, S.3
Vindhykumari, K.4
Subhashini, S.R.5
Vinitha, G.6
-
7
-
-
11244309139
-
Visualization of wormholes in sensor networks
-
ACM workshop on Wireless Security, ACM Press
-
W. Wang and B. Bhargava, "Visualization of wormholes in sensor networks" WiSe'04, Proceeding of the 2004 ACM workshop on Wireless Security , ACM Press, pp. 51-60, 2004.
-
(2004)
WiSe'04, Proceeding of the 2004
, pp. 51-60
-
-
Wang, W.1
Bhargava, B.2
-
11
-
-
72949104155
-
A survey on jamming attacks and countermeasures in wsns
-
Mpitziopoulos A. Gavalas D. Konstantopoulos C. Pantziou, G, "A Survey on Jamming Attacks and Countermeasures in WSNs" IEEE Communications Surveys & Tutorials, 2009, Volume 11, Issue 4, pp. 42-56
-
(2009)
IEEE Communications Surveys & Tutorials
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
13
-
-
80052197204
-
A defense technique for jamming attacks in wireless sensor networks based on si
-
S.Periyanayagi, V.Sumathy, Ramya Kulandaivel "A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based On SI" International Conference on Process Automation, Control and Computing, 2011, pp. 1-5.
-
(2011)
International Conference on Process Automation, Control and Computing
, pp. 1-5
-
-
Periyanayagi, S.1
Sumathy, V.2
Kulandaivel, R.3
-
14
-
-
80051886131
-
Localizing multiple jamming attackers in wireless networks
-
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu; "Localizing Multiple Jamming Attackers in Wireless Networks" 31st International Conference on Distributed Computing Systems, 2011, pp. 517-528.
-
(2011)
31st International Conference on Distributed Computing Systems
, pp. 517-528
-
-
Liu, H.1
Liu, Z.2
Chen, Y.3
Xu, W.4
-
15
-
-
84880205763
-
Determining the position of a jammer using a virtual-force iterative approach
-
Hongbo Liu, Zhenhua Liu, Yingying Chen and Wenyuan Xu, "Determining the position of a jammer using a virtual-force iterative approach" Wireless Network@ Springer, 2010, pp. 1-17
-
(2010)
Wireless Network@ Springer
, pp. 1-17
-
-
Liu, H.1
Liu, Z.2
Chen, Y.3
Xu, W.4
-
16
-
-
80053609582
-
-
Wireless Network@ Springer
-
Xuan Jiang, Wenhui Hu, Sencun Zhu and Guohong Cao, " Compromiseresilient anti-jamming communication in wireless sensor networks" Wireless Network@ Springer, 2011, pp. 1513-1527
-
(2011)
Compromiseresilient Anti-jamming Communication in Wireless Sensor Networks
, pp. 1513-1527
-
-
Jiang, X.1
Hu, W.2
Zhu, S.3
Cao, G.4
-
18
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
Mario Strasser, Boris Danev and Srdjan Capkun, "Detection of Reactive Jamming in Sensor Networks" ACM Transactions on Sensor Networks, Vol. 7, No. 2, Article 16, 2010
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
, Issue.2
, pp. 16
-
-
Strasser, M.1
Danev, B.2
Capkun, S.3
-
20
-
-
33847173839
-
Detecting selective forwarding attacks in wireless sensor networks
-
Greece, 25-29 April
-
Bo Yu, and Bin Xiao, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks", Proc. 20th International Parallel and Distributed Processing Symposium IPDPS 2006 (SSN2006), Page(s):1-8, Greece, 25-29 April 2006
-
(2006)
Proc. 20th International Parallel and Distributed Processing Symposium IPDPS 2006 (SSN2006)
, pp. 1-8
-
-
Yu, B.1
Xiao, B.2
-
22
-
-
51749097975
-
Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbor knowledge
-
Tran Hoang Hai and Eui nam Huh "Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbor knowledge" In NCA, pages 325-331, 2008.
-
(2008)
NCA
, pp. 325-331
-
-
Hai, T.H.1
Huh, E.N.2
-
23
-
-
51249104865
-
Detection of selective forwarding attacks in heterogeneous sensor networks
-
Jeremy Brown and Xiaojiang Du "Detection of selective forwarding attacks in heterogeneous sensor networks" In ICC, pages 1583-1587, 2008.
-
(2008)
ICC
, pp. 1583-1587
-
-
Brown, J.1
Du, X.2
-
25
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
Edith C. H. Ngai, Jiangchuan Liu and Michael R. Lyu; "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks" IEEE International Conference on Communications, 2006, Volume 8, pp. 3383-3389
-
(2006)
IEEE International Conference on Communications
, vol.8
, pp. 3383-3389
-
-
Ngai, C.H.1
Liu, J.2
Lyu, M.R.3
-
28
-
-
77957658759
-
Intrusion detection of sinkhole attacks in large-scale wireless sensor networks
-
Changlong Chen, Min Song, and George Hsieh; "Intrusion Detection of Sinkhole Attacks In Large-scale Wireless Sensor Networks" IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010, pp. 711-716
-
(2010)
IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)
, pp. 711-716
-
-
Chen, C.1
Song, M.2
Hsieh, G.3
-
32
-
-
3042785862
-
-
IPSN'04, April 26-27, , Berkeley, California, USA
-
James Newsome, Elaine Shi, Dawn Song, Adrian Perrig "The Sybil attack in sensor networks: analysis & defenses" IPSN'04, April 26-27, 2004, Berkeley, California, USA
-
(2004)
The Sybil Attack in Sensor Networks: Analysis & Defenses
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
33
-
-
85116427082
-
Defending against Sybil attacks in sensor networks
-
Washington, DC, USA, ISBN: 0-7695-2328-5-02
-
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning "Defending against Sybil attacks in sensor networks" Proceedings of the Second International Workshop on Security in Distributed Computing Systems (ICDCSW'05), Volume 2, Washington, DC, USA, ISBN:0-7695-2328-5-02
-
Proceedings of the Second International Workshop on Security in Distributed Computing Systems (ICDCSW'05)
, vol.2
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.S.3
Ning, P.4
|