-
1
-
-
52049111327
-
Wireless sensor networks and applications: a survey
-
March
-
F. C. García-Hernández, et al, "Wireless sensor networks and applications: a survey," International Journal of Computer Science and Network Security (IJCSNS), vol. 7, No. 3, pp. 264-273, March 2007.
-
(2007)
International Journal of Computer Science and Network Security (IJCSNS)
, vol.7
, Issue.3
, pp. 264-273
-
-
García-Hernández, F.C.1
-
2
-
-
84862307531
-
Energy and throughput analysis of Hierarchical routing protocol (LEACH) for wireless sensor network
-
April
-
R. Patel, S. Pariyani, V. Ukani, "Energy and throughput analysis of Hierarchical routing protocol (LEACH) for wireless sensor network," International Journal of Computer Applications, Vol. 20, No. 4, pp. 32-36, April 2011.
-
(2011)
International Journal of Computer Applications
, vol.20
, Issue.4
, pp. 32-36
-
-
Patel, R.1
Pariyani, S.2
Ukani, V.3
-
3
-
-
84874579042
-
Security model for hierarchical clustered wireless sensor networks
-
K. Sharama, M. K. Ghose, "Security model for hierarchical clustered wireless sensor networks," International Journal of Computer Science and Security (IJCSS), vol. 5, No. 1, pp. 85-97, 2011.
-
(2011)
International Journal of Computer Science and Security (IJCSS)
, vol.5
, Issue.1
, pp. 85-97
-
-
Sharama, K.1
Ghose, M.K.2
-
4
-
-
85034572933
-
Energy efficient communication protocol for wireless micro sensor networks
-
Hawaii, January
-
W. R. Heinzelman, A. Chandarkasan, H. Balakrishanan, "Energy efficient communication protocol for wireless micro sensor networks", 33rd IEEE International Conference on System Sciences, pp. 1-10, Hawaii, January 2000.
-
(2000)
33rd IEEE International Conference on System Sciences
, pp. 1-10
-
-
Heinzelman, W.R.1
Chandarkasan, A.2
Balakrishanan, H.3
-
5
-
-
51949089156
-
PEGASIS: power-efficient gathering in sensor information systems
-
S. Lindsey, C. Raghavendra, "PEGASIS: power-efficient gathering in sensor information systems", IEEE Aerospace Conference, pp. 1125-1130, 2002.
-
(2002)
IEEE Aerospace Conference
, pp. 1125-1130
-
-
Lindsey, S.1
Raghavendra, C.2
-
6
-
-
79959697645
-
HEEP (hybrid energy efficient protocol) based chain clustering
-
D. E. Boubiche, A. Bilami, HEEP (hybrid energy efficient protocol) based chain clustering, Int. J. Sensor Networks, vol. 10, No. 1/2, pp. 25-35, 2011.
-
(2011)
Int. J. Sensor Networks
, vol.10
, Issue.1-2
, pp. 25-35
-
-
Boubiche, D.E.1
Bilami, A.2
-
7
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, B. Ramamurthy, "A survey of security issues in wireless sensor networks,'' IEEE communications surveys & tutorials, vol. 8, No. 2, pp. 2-21, 2006.
-
(2006)
IEEE communications surveys & tutorials
, vol.8
, Issue.2
, pp. 2-21
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
8
-
-
84942426861
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
University of California at Berkeley
-
C. Karlof, D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," University of California at Berkeley, 2003.
-
(2003)
-
-
Karlof, C.1
Wagner, D.2
-
9
-
-
24644507953
-
On the security of cluster-based communication protocols for wireless sensor networks
-
Berlin
-
A. C. Ferreira, et al, "On the security of cluster-based communication protocols for wireless sensor networks", Fourth IEEE International Conference on Networking (ICNŠ), Berlin, pp. 449-458, 2005.
-
(2005)
Fourth IEEE International Conference on Networking (ICNŠ)
, pp. 449-458
-
-
Ferreira, A.C.1
-
10
-
-
50649125128
-
Research and improve on secure routing protocols in wireless sensor networks
-
Shanghai, May
-
D. Wu, G. Hu, and G. Ni, "Research and improve on secure routing protocols in wireless sensor networks", Fourth IEEE International Conference on Circuits and Systems for Communications (ICCSC), pp. 853-856, Shanghai, May 2008.
-
(2008)
Fourth IEEE International Conference on Circuits and Systems for Communications (ICCSC)
, pp. 853-856
-
-
Wu, D.1
Hu, G.2
Ni, G.3
-
11
-
-
77649289647
-
A secure routing protocol for cluster-based wireless sensor networks using group key management
-
K. Zhang, C. Wang, C. Wang, "A secure routing protocol for cluster-based wireless sensor networks using group key management", IEEE Computer Society, pp. 1-5, 2008.
-
(2008)
IEEE Computer Society
, pp. 1-5
-
-
Zhang, K.1
Wang, C.2
Wang, C.3
-
12
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Piscataway, USA: IEEE
-
H. Chan, A. Perrig, D. Song, "Random key predistribution schemes for sensor networks," Proceedings of the IEEE Computer Society Symposium on Security and Privacy, Piscataway, USA: IEEE, pp. 197-213, 2003.
-
(2003)
Proceedings of the IEEE Computer Society Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
14
-
-
84865374007
-
Multiple Secret Keys based Security for Wireless Sensor Networks
-
April
-
V. T. Kesavan, S. Radhakrishnan, "Multiple Secret Keys based Security for Wireless Sensor Networks", International Journal of Communication Networks and Information Security (IJCNIS), Vol. 4, No. 1, April 2012.
-
(2012)
International Journal of Communication Networks and Information Security (IJCNIS)
, vol.4
, Issue.1
-
-
Kesavan, V.T.1
Radhakrishnan, S.2
-
15
-
-
11144229255
-
General method of program code obfusction
-
Research and Practise (SERP), June
-
G. Wroblewski, "General method of program code obfusction," Proc. Int'l Conf. Software Eng. Research and Practise (SERP), June 2002.
-
(2002)
Proc. Int'l Conf. Software Eng.
-
-
Wroblewski, G.1
-
16
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
May/June
-
T. Park, S. Member, K. G. Shin, "Soft tamper-proofing via program integrity verification in wireless sensor networks," IEEE Transactions on mobile computing, vol. 4, No. 3, pp. 297-308, May/June 2005.
-
(2005)
IEEE Transactions on mobile computing
, vol.4
, Issue.3
, pp. 297-308
-
-
Park, T.1
Member, S.2
Shin, K.G.3
-
17
-
-
84881313532
-
-
http://cordis.europa.eu/projects/rcn/95511_en.html. [18]A. Abduvaliyev, et al, "On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237, 2013.
-
-
-
-
18
-
-
84881313532
-
On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks
-
A. Abduvaliyev, et al, "On the Vital areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Vol. 15, No. 3, pp. 1223-1237, 2013.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.15
, Issue.3
, pp. 1223-1237
-
-
Abduvaliyev, A.1
-
19
-
-
84878653416
-
Intrusion Detection Systems in Wireless Sensor Networks: A Review
-
N. A. Alrajeh, S. Khan, B. Shams, "Intrusion Detection Systems in Wireless Sensor Networks: A Review", International Journal of Distributed Sensor Networks, pp. 1-7, 2013.
-
(2013)
International Journal of Distributed Sensor Networks
, pp. 1-7
-
-
Alrajeh, N.A.1
Khan, S.2
Shams, B.3
-
20
-
-
84888997678
-
Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks
-
Intelligence, Systems and Applications (IISA), Piraeus, July
-
E. Darra, S. K. Katsikas, "Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks", IEEE Fourth International Conference on Information, Intelligence, Systems and Applications (IISA), Piraeus, 10-12 July 2013
-
(2013)
IEEE Fourth International Conference on Information
, pp. 10-12
-
-
Darra, E.1
Katsikas, S.K.2
-
22
-
-
78651576751
-
An isolation intrusion detection system for hierarchical wireless sensor networks
-
March
-
R. C. Chen, C. F. Hsieh, Y. F. Huang, "An isolation intrusion detection system for hierarchical wireless sensor networks," Journal of networks, vol. 5, No. 3, pp. 335-342, March 2010.
-
(2010)
Journal of networks
, vol.5
, Issue.3
, pp. 335-342
-
-
Chen, R.C.1
Hsieh, C.F.2
Huang, Y.F.3
-
23
-
-
78049343135
-
Energy efficient hybrid intrusion detection system for wireless sensor networks
-
Kyoto
-
A. Abduvaliyev, S. Lee, Y. K. Lee, "Energy efficient hybrid intrusion detection system for wireless sensor networks," International Conference on Electronics and Information Engineering (ICEIE), Vol. 2, pp. 25-29, Kyoto, 2010.
-
(2010)
International Conference on Electronics and Information Engineering (ICEIE)
, vol.2
, pp. 25-29
-
-
Abduvaliyev, A.1
Lee, S.2
Lee, Y.K.3
-
24
-
-
84878667451
-
A cross layer intrusion detection system for wireless sensor network
-
March
-
D. E. Boubiche, A. Bilami, "A cross layer intrusion detection system for wireless sensor network," International Journal of Network Security & Its Applications (IJNSA), vol. 4, No, 2, pp. 35-52, March 2012.
-
(2012)
International Journal of Network Security & Its Applications (IJNSA)
, vol.4
, Issue.2
, pp. 35-52
-
-
Boubiche, D.E.1
Bilami, A.2
-
25
-
-
79952929509
-
A survey on secure hierarchical routing protocols in wireless sensor networks
-
India, February
-
S. Sharma, S. Kumar, "A survey on secure hierarchical routing protocols in wireless sensor networks," proceedings of ACM ICCCS'11, India, pp. 146-151, February 2011.
-
(2011)
proceedings of ACM ICCCS'11
, pp. 146-151
-
-
Sharma, S.1
Kumar, S.2
-
26
-
-
84890131483
-
The MIT uAMPSns code extensions, Version 1.0
-
Cambridge, August
-
The MIT uAMPSns code extensions, Version 1.0, Massachusetts Institute of Technology. Cambridge, August, 2000.
-
(2000)
Massachusetts Institute of Technology
-
-
|