-
3
-
-
33846973685
-
Ideas: Intrusion detection based on emotional ants for sensors
-
S. Banerjee, C. Grosan, and A. Abraham. Ideas: intrusion detection based on emotional ants for sensors. In Intelligent Systems Design and Applications, 2005. ISDA '05. Proceedings. 5th International Conference on, pages 344-349, 2005.
-
(2005)
Intelligent Systems Design and Applications, 2005. ISDA '05. Proceedings. 5th International Conference on
, pp. 344-349
-
-
Banerjee, S.1
Grosan, C.2
Abraham, A.3
-
4
-
-
84893439670
-
-
Blackhat. com. Hack into diabet imd
-
Blackhat. com. Hack into diabet imd.
-
-
-
-
6
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3):15, 2009.
-
(2009)
ACM Computing Surveys (CSUR)
, vol.41
, Issue.3
, pp. 15
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
7
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. K. Venkatasubramanian, S. K. S. Gupta, and E. K. S. Gupta. Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In in Wireless Networks of Biosensors Implanted in the Human Body, Workshop on Wireless Security and Privacy (WiSPr), International Conference on Parallel Processing Workshops, 2003, 2003.
-
(2003)
Wireless Networks of Biosensors Implanted in the Human Body, Workshop on Wireless Security and Privacy (WiSPr), International Conference on Parallel Processing Workshops, 2003
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
Gupta, E.K.S.4
-
9
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
New York, NY, USA, ACM
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Q2SWinet '05, pages 16-23, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Q2SWinet '05
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
10
-
-
84893504799
-
Imd-ids a specification based intrusion detection system for wireless imds
-
April. Published by Foundation of Computer Science, New York, USA
-
M. Darji and B. Trivedi. Imd-ids a specification based intrusion detection system for wireless imds. International Journal of Applied Information Systems, 5(6):19-23, April 2013. Published by Foundation of Computer Science, New York, USA.
-
(2013)
International Journal of Applied Information Systems
, vol.5
, Issue.6
, pp. 19-23
-
-
Darji, M.1
Trivedi, B.2
-
11
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
Berkeley, CA, USA. USENIX Association
-
T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: new directions for implantable medical device security. In Proceedings of the 3rd conference on Hot topics in security, HOTSEC'08, pages 5:1-5:7, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC'08
, pp. 51-57
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
12
-
-
35548948372
-
Secure probabilistic location verification in randomly deployed wireless sensor networks
-
E. Ekici, S. Vural, J. McNair, and D. Al-Abri. Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Networks, 6(2):195-209, 2008.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.2
, pp. 195-209
-
-
Ekici, E.1
Vural, S.2
McNair, J.3
Al-Abri, D.4
-
15
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J. E. D́?az-Verdejo, G. Macía- Ferńandez, and E. V́azquez. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2):18-28, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
D́az-Verdejo, J.E.2
Macía-Ferńandez, G.3
V́azquez, E.4
-
16
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
New York, NY, USA ACM
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. In Proceedings of the ACM SIGCOMM 2011 conference, SIGCOMM '11, pages 2-13, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference, SIGCOMM '11
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
18
-
-
70350656962
-
Nox: Towards an operating system for networks
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. Nox: towards an operating system for networks. ACM SIGCOMM Computer Communication Review, 38(3):105-110, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
19
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses. In IEEE Symposium on Security and Privacy, pages 129-142, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
21
-
-
77955131272
-
Wlan location determination without active client collaboration
-
New York, NY, USA, ACM
-
S. Kraxberger, G. Lackner, and U. Payer. Wlan location determination without active client collaboration. In Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC '10, pages 1188-1192, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC '10
, pp. 1188-1192
-
-
Kraxberger, S.1
Lackner, G.2
Payer, U.3
-
23
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69-74, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
26
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
I. Onat and A. Miri. An intrusion detection system for wireless sensor networks. In WiMob (3), pages 253-259, 2005.
-
(2005)
WiMob
, Issue.3
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
27
-
-
70449442024
-
Bigdog, the rough-terrain quadruped robot
-
M. Raibert, K. Blankespoor, G. Nelson, R. Playter, et al. Bigdog, the rough-terrain quadruped robot. In Proceedings of the 17th World Congress of the International Federation of Automatic Control, pages 10823-10825, 2008.
-
(2008)
Proceedings of the 17th World Congress of the International Federation of Automatic Control
, pp. 10823-10825
-
-
Raibert, M.1
Blankespoor, K.2
Nelson, G.3
Playter, R.4
-
30
-
-
84893365261
-
Fresco: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson. Fresco: Modular composable security services for software-defined networks. In To appear in the ISOC Network and Distributed System Security Symposium, 2013.
-
(2013)
The ISOC Network and Distributed System Security Symposium
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
31
-
-
84877624157
-
Verifiably-safe software-defined networks for CPS
-
Philedelphia, PA, USA, April
-
R. Skowyra, A. Lapets, A. Bestavros, and A. Kfoury. Verifiably-Safe Software-Defined Networks for CPS. In Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (HiCoNS 2013), Philedelphia, PA, USA, April 2013.
-
(2013)
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (HiCoNS 2013)
-
-
Skowyra, R.1
Lapets, A.2
Bestavros, A.3
Kfoury, A.4
-
32
-
-
0036645213
-
A system for semi-autonomous tractor operations
-
July
-
A. T. Stentz, C. Dima, C. Wellington, H. Herman, and D. Stager. A system for semi-autonomous tractor operations. Autonomous Robots, 13(1):87-103, July 2002.
-
(2002)
Autonomous Robots
, vol.13
, Issue.1
, pp. 87-103
-
-
Stentz, A.T.1
Dima, C.2
Wellington, C.3
Herman, H.4
Stager, D.5
-
35
-
-
79960873920
-
Imdguard: Securing implantable medical devices with the external wearable guardian
-
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. Imdguard: Securing implantable medical devices with the external wearable guardian. In INFOCOM, pages 1862-1870, 2011.
-
(2011)
INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.C.3
Wang, B.4
Li, Q.5
-
36
-
-
46749099829
-
Providing vanet security through active position detection
-
G. Yan, S. Olariu, and M. C. Weigle. Providing vanet security through active position detection. Computer Communications, 31(12):2883-2897, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2883-2897
-
-
Yan, G.1
Olariu, S.2
Weigle, M.C.3
|