-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393-422
-
(2002)
Comput Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
84941709469
-
Model-checking continuous-time markov chains
-
Aziz A, Sanwal K, Singhal V, Brayton R (2000) Model-checking continuous-time markov chains. ACM Trans Comput Logic (TOCL) 1(1):162-170
-
(2000)
ACM Trans Comput Logic (TOCL)
, vol.1
, Issue.1
, pp. 162-170
-
-
Aziz, A.1
Sanwal, K.2
Singhal, V.3
Brayton, R.4
-
4
-
-
3042778324
-
Stochastic properties of the random waypoint mobility model
-
Bettstetter C, Hartenstein H, Pérez-Costa X (2004) Stochastic properties of the random waypoint mobility model. Wirel Netw 10(5):555-567
-
(2004)
Wirel Netw
, vol.10
, Issue.5
, pp. 555-567
-
-
Bettstetter, C.1
Hartenstein, H.2
Pérez-Costa, X.3
-
8
-
-
84893841880
-
Node compromise attacks and network connectivity
-
International Society for Optics and Photonics
-
Chan K, Fekri F (2007) Node compromise attacks and network connectivity. In: Defense and security symposium, pp 65,780W-65,780W. International Society for Optics and Photonics
-
(2007)
Defense and Security Symposium
-
-
Chan, K.1
Fekri, F.2
-
9
-
-
84887997518
-
Enhancing the attacking efficiency of the node capture attack in wsn: A matrix approach
-
Chi LinGW(2013) Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach. J Supercomput
-
(2013)
J Supercomput
-
-
Chi Lin, G.W.1
-
10
-
-
17244373061
-
An extended localized algorithm for connected dominating set formation in ad hoc wireless networks
-
Dai F,Wu J (2004) An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans Parallel Distrib Syst 15(10):908-920
-
(2004)
IEEE Trans Parallel Distrib Syst
, vol.15
, Issue.10
, pp. 908-920
-
-
Dai, F.1
Wu, J.2
-
12
-
-
67651048997
-
Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory
-
De P, Liu Y, Das SK (2009) Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans Sens Netw (TOSN) 5(3):23-50
-
(2009)
ACM Trans Sens Netw (TOSN)
, vol.5
, Issue.3
, pp. 23-50
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
13
-
-
79953816985
-
Increasing resiliency in multiphase wireless sensor networks: Generationwise key predistribution approach
-
Ergun M, Levi A, Savas E (2011) Increasing resiliency in multiphase wireless sensor networks: generationwise key predistribution approach. Comput J 54(4):602-616
-
(2011)
Comput J
, vol.54
, Issue.4
, pp. 602-616
-
-
Ergun, M.1
Levi, A.2
Savas, E.3
-
14
-
-
42549114396
-
An effective broadcast scheme for alert message propagation in vehicular ad hoc networks
-
IEEE
-
Fasolo E, Zanella A, Zorzi M (2006) An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In: IEEE international conference on communications, 2006. ICC'06, vol 9. IEEE, pp 3960-3965
-
(2006)
IEEE International Conference on Communications, 2006. ICC'06
, vol.9
, pp. 3960-3965
-
-
Fasolo, E.1
Zanella, A.2
Zorzi, M.3
-
15
-
-
84875706246
-
Group communication on highways: An evaluation study of geocast protocols and applications
-
Felice MD, Bedogni L, Bononi L (2012) Group communication on highways: an evaluation study of geocast protocols and applications. Ad Hoc Netw 11(7):818-832
-
(2012)
Ad Hoc Netw
, vol.11
, Issue.7
, pp. 818-832
-
-
Felice, M.D.1
Bedogni, L.2
Bononi, L.3
-
21
-
-
79958096565
-
Performance evaluation of routing protocols in vehicular ad hoc networks
-
Husain A, Kumar B, Doegar A (2011) Performance evaluation of routing protocols in vehicular ad hoc networks. Int J Internet Protocol Technol 6(1):38-45
-
(2011)
Int J Internet Protocol Technol
, vol.6
, Issue.1
, pp. 38-45
-
-
Husain, A.1
Kumar, B.2
Doegar, A.3
-
22
-
-
77956926901
-
Security attacks and solutions for vehicular ad hoc networks
-
Isaac JT, Zeadally S, Cámara JS (2010) Security attacks and solutions for vehicular ad hoc networks. IET Commun 4(7):894-903
-
(2010)
IET Commun
, vol.4
, Issue.7
, pp. 894-903
-
-
Isaac, J.T.1
Zeadally, S.2
Cámara, J.S.3
-
27
-
-
62949184270
-
Modeling roadside attacker behavior in vanets
-
Leinmuller T, Schmidt RK, Schoch E, Held A, Schafer G (2008) Modeling roadside attacker behavior in vanets. In: 2008 IEEE GLOBECOM workshops. IEEE, pp 1-10
-
(2008)
2008 IEEE GLOBECOM Workshops. IEEE
, pp. 1-10
-
-
Leinmuller, T.1
Schmidt, R.K.2
Schoch, E.3
Held, A.4
Schafer, G.5
-
28
-
-
42649121690
-
Security in vehicular ad hoc networks
-
Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Commun Mag 46(4):88-95
-
(2008)
IEEE Commun Mag
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.H.5
Shen, X.6
-
29
-
-
50249147682
-
Illusion attack on vanet applications-A message plausibility problem
-
Lo NW, Tsai HC (2007) Illusion attack on vanet applications-a message plausibility problem. In: 2007 IEEE Globecom Workshops. IEEE, pp 1-8
-
(2007)
2007 IEEE Globecom Workshops. IEEE
, pp. 1-8
-
-
Lo, N.W.1
Tsai, H.C.2
-
30
-
-
79960522491
-
A survey and comparative study of simulators for vehicular ad hoc networks (vanets)
-
Martinez FJ, Toh CK, Cano JC, Calafate CT, Manzoni P (2011) A survey and comparative study of simulators for vehicular ad hoc networks (vanets). Wirel Commun Mob Comput 11(7):813-828
-
(2011)
Wirel Commun Mob Comput
, vol.11
, Issue.7
, pp. 813-828
-
-
Martinez, F.J.1
Toh, C.K.2
Cano, J.C.3
Calafate, C.T.4
Manzoni, P.5
-
33
-
-
35349016950
-
Amoeba: Robust location privacy scheme for vanet
-
Sampigethaya K, Li M, Huang L, Poovendran R (2007) Amoeba: robust location privacy scheme for vanet. IEEE J Select Areas Commun 25(8):1569-1589
-
(2007)
IEEE J Select Areas Commun
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
34
-
-
62249166562
-
Dtn based dominating set routing for manet in heterogeneous wireless networking
-
Samuel H, Zhuang W, Preiss B (2009) Dtn based dominating set routing for manet in heterogeneous wireless networking. Mob Netw Appl 14(2):154-164
-
(2009)
Mob Netw Appl
, vol.14
, Issue.2
, pp. 154-164
-
-
Samuel, H.1
Zhuang, W.2
Preiss, B.3
-
35
-
-
34248339107
-
Modeling adaptive node capture attacks in multi-hop wireless networks
-
Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801-814
-
(2007)
Ad Hoc Netw
, vol.5
, Issue.6
, pp. 801-814
-
-
Tague, P.1
Poovendran, R.2
-
38
-
-
67649198136
-
Evaluating the vulnerability of network traffic using joint security and routing analysis
-
Tague P, Slater D, Rogers J, Poovendran R (2009) Evaluating the vulnerability of network traffic using joint security and routing analysis. IEEE Trans Depend Secure Comput 6(2):111-123
-
(2009)
IEEE Trans Depend Secure Comput
, vol.6
, Issue.2
, pp. 111-123
-
-
Tague, P.1
Slater, D.2
Rogers, J.3
Poovendran, R.4
-
41
-
-
84893821137
-
A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set
-
Wu G, Chen X, Obaidat MS, Lin C (2012) A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. Secur Commun Netw
-
(2012)
Secur Commun Netw
-
-
Wu, G.1
Chen, X.2
Obaidat, M.S.3
Lin, C.4
-
42
-
-
46749099829
-
Providing vanet security through active position detection
-
Yan G, Olariu S, Weigle MC (2008) Providing vanet security through active position detection. Comput Commun 31(12):2883-2897
-
(2008)
Comput Commun
, vol.31
, Issue.12
, pp. 2883-2897
-
-
Yan, G.1
Olariu, S.2
Weigle, M.C.3
-
43
-
-
57049127600
-
Efficient directional network backbone construction in mobile ad hoc networks
-
Yang S, Wu J, Dai F (2008) Efficient directional network backbone construction in mobile ad hoc networks. IEEE Trans Parallel Distrib Syst 19(12):1601-1613
-
(2008)
IEEE Trans Parallel Distrib Syst
, vol.19
, Issue.12
, pp. 1601-1613
-
-
Yang, S.1
Wu, J.2
Dai, F.3
-
44
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24-30
-
(1999)
IEEE Netw
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|