-
1
-
-
84874333373
-
An rf-dna verification process for zigbee networks
-
C. Dubendorfer, B. Ramsey, and M. Temple, "An RF-DNA Verification Process for ZigBee Networks", Military Communications Conference (MILCOM '12), pp. 1-6, 2012.
-
(2012)
Military Communications Conference (MILCOM '12
, pp. 1-6
-
-
Dubendorfer, C.1
Ramsey, B.2
Temple, M.3
-
3
-
-
84861173936
-
Wireless corrosion monitoring for evaluation of aircraft structural health
-
J. Demo, F. Friedersdorf, C. Andrews, and M. Putic, "Wireless Corrosion Monitoring for Evaluation of Aircraft Structural Health", IEEE Aerospace Conference, pp. 1-10, 2012.
-
(2012)
IEEE Aerospace Conference
, pp. 1-10
-
-
Demo, J.1
Friedersdorf, F.2
Andrews, C.3
Putic, M.4
-
4
-
-
80053623415
-
Gestural system based on multi-functional sensors and zigbee networks for squad communication
-
N. Tongrod, S. Lokavee, T. Kerdcharoen, N. Watthanawisuth, and A. Tuantranont, "Gestural System based on Multi-Functional Sensors and ZigBee Networks for Squad Communication", Defense Science Research Conference and Expo (DSR), pp. 1-4, 2011.
-
(2011)
Defense Science Research Conference and Expo (DSR
, pp. 1-4
-
-
Tongrod, N.1
Lokavee, S.2
Kerdcharoen, T.3
Watthanawisuth, N.4
Tuantranont, A.5
-
7
-
-
77954318750
-
Recommended practices guide for securing zigbee wireless networks in process control system environments
-
K. Masica, "Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments", Lawrence Livermore National Laboratory, 2007.
-
(2007)
Lawrence Livermore National Laboratory
-
-
Masica, K.1
-
8
-
-
84885894065
-
Extracting keys from second generation zigbee chips
-
T. Goodspeed, "Extracting Keys from Second Generation ZigBee Chips", Black Hat USA, http://www.blackhat.com/presentations/bhusa-09/ GOODSPEED/BHUSA09-Goodspeed-ZigbeeChips-PAPER.pdf, 2009.
-
(2009)
Black Hat USA
-
-
Goodspeed, T.1
-
9
-
-
80052431312
-
On experimentally evaluating the impact of security on ieee 802.15.4 networks
-
R. Daidone, G. Dini, and M. Tiloca, "On Experimentally Evaluating the Impact of Security on IEEE 802.15.4 Networks", Int'l Conference on Distributed Computing in Sensor Systems and Workshops, pp. 1-6, 2011.
-
(2011)
Int'l Conference on Distributed Computing in Sensor Systems and Workshops
, pp. 1-6
-
-
Daidone, R.1
Dini, G.2
Tiloca, M.3
-
11
-
-
84897723776
-
Killerbee:Framework and tools for exploiting zigbee and ieee 802.15.4 networks
-
J. Wright, "KillerBee: Framework and Tools for Exploiting ZigBee and IEEE 802.15.4 Networks." Version 1.0, https://code.google.com/p/killerbee/ , 2010.
-
(2010)
Version 1.0
-
-
Wright, J.1
-
12
-
-
84863269702
-
Apido:Tools for exploring the wireless attack surface in smart meters
-
T. Goodspeed, S. Bratus, R. Melgares, R. Speers, and S. Smith, "Apido: Tools for Exploring the Wireless Attack Surface in Smart Meters", Hawaii Int'l Conference on System Sciences, pp. 2133-2140, 2012.
-
(2012)
Hawaii Int'l Conference on System Sciences
, pp. 2133-2140
-
-
Goodspeed, T.1
Bratus, S.2
Melgares, R.3
Speers, R.4
Smith, S.5
-
13
-
-
77955290181
-
Comparative study of security in ieee 802.11-2007 and ieee 802.15.4-2006 for patient monitoring environments
-
A. Ahmad, A. Riedl, W. Naramore, N. Chou, M. Alley, "Comparative Study of Security in IEEE 802.11-2007 and IEEE 802.15.4-2006 for Patient Monitoring Environments", Int'l Conf. on Information Technology: New Generations (ITNG), pp. 914-918, 2010.
-
(2010)
Int'l Conf. on Information Technology: New Generations (ITNG
, pp. 914-918
-
-
Ahmad, A.1
Riedl, A.2
Naramore, W.3
Chou, N.4
Alley, M.5
-
14
-
-
84877659198
-
Phy foundation for multi-factor zigbee node authentication
-
B. Ramsey, M. Temple, and B. Mullins, "PHY Foundation for Multi-Factor ZigBee Node Authentication", IEEE Global Telecommunications Conference (GLOBECOM '12), pp. 818-818, 2012.
-
(2012)
IEEE Global Telecommunications Conference (GLOBECOM '12
, pp. 818-818
-
-
Ramsey, B.1
Temple, M.2
Mullins, B.3
-
16
-
-
84875537166
-
Security threats in zigbee-enabled systems:Vulnerability evaluation, practical experiments, countermeasures, and lessons learned
-
N. Vidgren, K. Haataja, J. Patino-Andres, J. Ramirez-Sanchis, and P. Toivanen, "Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned", Hawaii Int'l Conf. on Systems Sciences (HICSS '13), pp. 5132-5138, 2013.
-
(2013)
Hawaii Int'l Conf. on Systems Sciences (HICSS '13
, pp. 5132-5138
-
-
Vidgren, N.1
Haataja, K.2
Patino-Andres, J.3
Ramirez-Sanchis, J.4
Toivanen, P.5
-
18
-
-
84874344339
-
Improved tools for indoor zigbee warwalking
-
B. Ramsey, B. Mullins, and E. White, "Improved Tools for Indoor ZigBee Warwalking", 7th IEEE Int'l Workshop on Practical Issues in Building Sensor Network Applications (SenseApp '12), pp. 921-924, 2012.
-
(2012)
7th IEEE Int'l Workshop on Practical Issues in Building Sensor Network Applications (SenseApp '12
, pp. 921-924
-
-
Ramsey, B.1
Mullins, B.2
White, E.3
-
19
-
-
84897675334
-
-
Moteiv Corporation
-
Moteiv Corporation, Telos Rev B (Low Power Wireless Sensor Module), http://pharos.ece.utexas.edu/wiki/index.php/File:Telosb-manual.pdf, 2004.
-
(2004)
Telos Rev B (Low Power Wireless Sensor Module
-
-
-
22
-
-
78651398360
-
Uncovering spoken phrases in encrypted voice over ip conversations
-
article 35
-
C. Wright, L. Ballard, S. Coull, F. Monrose, and G. Masson, "Uncovering Spoken Phrases in Encrypted Voice over IP Conversations", ACM Transactions on Information and System Security (TISSEC), Vol. 13, no. 4, article 35, pp. 1-30, 2010.
-
(2010)
ACM Transactions on Information and System Security (TISSEC
, vol.13
, Issue.4
, pp. 1-30
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
-
23
-
-
21844439479
-
The impact of mac parameters on the performance of 802.15.4 pan
-
J. Misic, S. Shafi, and V. Misic, "The Impact of MAC Parameters on the Performance of 802.15.4 PAN", Ad Hoc Networks, vol. 3, no. 5, pp. 509-528, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.5
, pp. 509-528
-
-
Misic, J.1
Shafi, S.2
Misic, V.3
-
24
-
-
34648851419
-
A comprehensive simulation study of slotted csma/ca for ieee 802.15.4 wireless sensor networks
-
A. Koubaa, M. Alves, and E. Tovar, "A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks", IEEE Workshop on Factory Communication Systems, pp. 183-192, 2006.
-
(2006)
IEEE Workshop on Factory Communication Systems
, pp. 183-192
-
-
Koubaa, A.1
Alves, M.2
Tovar, E.3
-
25
-
-
34047207444
-
Analysis of the contention access period of ieee 802.15.4 mac
-
I. Ramachandran, A. Das, and S. Roy, "Analysis of the Contention Access Period of IEEE 802.15.4 MAC", ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 1, pp. 1-29, 2007.
-
(2007)
ACM Transactions on Sensor Networks (TOSN
, vol.3
, Issue.1
, pp. 1-29
-
-
Ramachandran, I.1
Das, A.2
Roy, S.3
-
26
-
-
46449101996
-
Performance evaluation of an ieee 802.15.4 sensor network with a star topology
-
C. Singh, A. Kumar, and P. Ameer, "Performance Evaluation of an IEEE 802.15.4 Sensor Network with a Star Topology", Wireless Networks Journal, vol. 14, no. 4, pp. 543-568, 2008.
-
(2008)
Wireless Networks Journal
, vol.14
, Issue.4
, pp. 543-568
-
-
Singh, C.1
Kumar, A.2
Ameer, P.3
-
27
-
-
79951581842
-
A comprehensive analysis of the mac unreliability problem in ieee 802.15.4 wireless sensor networks
-
G. Anastaso, M. Conti, and M. Francesco, "A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks", IEEE Transactions on Industrial Informatics, vol. 7, no. 1, pp. 52-65, 2010.
-
(2010)
IEEE Transactions on Industrial Informatics
, vol.7
, Issue.1
, pp. 52-65
-
-
Anastaso, G.1
Conti, M.2
Francesco, M.3
-
28
-
-
80052431312
-
On experimentally evaluating the impact of security on ieee 802.15.4 networks
-
R. Daidone, G. Dini, and M. Tiloca, "On Experimentally Evaluating the Impact of Security on IEEE 802.15.4 Networks", Int'l Conf. on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1-6, 2011.
-
(2011)
Int'l Conf. on Distributed Computing in Sensor Systems and Workshops (DCOSS
, pp. 1-6
-
-
Daidone, R.1
Dini, G.2
Tiloca, M.3
-
29
-
-
84861119848
-
Performance and evaluation of ieee 802.15.4 under different topologies with ad-hoc on demand distance vector protocol
-
D. Borade and S. Laeeq, "Performance and Evaluation of IEEE 802.15.4 under Different Topologies with Ad-hoc On Demand Distance Vector Protocol", IEEE Students' Conf. on Electrical, Electronics and Computer Science, pp. 1-4, 2012.
-
(2012)
IEEE Students' Conf. on Electrical, Electronics and Computer Science
, pp. 1-4
-
-
Borade, D.1
Laeeq, S.2
-
30
-
-
52649181010
-
Performance analysis of slotted carrier sense ieee 802.15.4 medium access layer
-
S. Pollin, M. Ergen, S. Ergen, B. Bougard, L. Der Perre, I. Moerman, A. Bahai, P. Varaiya, and F. Catthoor, "Performance Analysis of Slotted Carrier Sense IEEE 802.15.4 Medium Access Layer", IEEE Transactions on Wireless Communications, vol. 7, no. 9, pp. 3359-3371, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.9
, pp. 3359-3371
-
-
Pollin, S.1
Ergen, M.2
Ergen, S.3
Bougard, B.4
Der Perre, L.5
Moerman, I.6
Bahai, A.7
Varaiya, P.8
Catthoor, F.9
-
31
-
-
0004031293
-
-
McGraw-Hill, Inc., 3rd edition
-
A. Mood, F. Braybill, and D. Boes, Introduction to the Theory of Statistics. McGraw-Hill, Inc., 3rd edition, 1963.
-
(1963)
Introduction to the Theory of Statistics
-
-
Mood, A.1
Braybill, F.2
Boes, D.3
-
33
-
-
84947563170
-
-
John Wiley and Sons, Inc., Hoboken, New Jersey
-
P. Kvam, and B. Vidakovic, Nonparametric Statistics with Applications to Science and Engineering. John Wiley and Sons, Inc., Hoboken, New Jersey, 2007.
-
(2007)
Nonparametric Statistics with Applications to Science and Engineering
-
-
Kvam, P.1
Vidakovic, B.2
-
34
-
-
84863304598
-
A language and environment for statistical computing
-
R Development Core Team. R Vienna, Austria
-
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2001. URL http://www.R-project.org/. ISBN 3-900051-07-0.
-
(2001)
R Foundation for Statistical Computing
-
-
-
35
-
-
79961226937
-
Multivariate and propensity score matching software with automated balance optimization
-
J. Sekhon, Multivariate and Propensity Score Matching Software with Automated Balance Optimization: The Matching Package for R. Journal of Statistical Software, 42(7), 1-52. URL http://www.jstatsoft.org/v42/i07/.2011.
-
(2011)
The Matching Package for R. Journal of Statistical Software
, vol.42
, Issue.7
, pp. 1-52
-
-
Sekhon, J.1
-
37
-
-
34548065758
-
Packet error rate analysis of zigbee under wlan and bluetooth interferences
-
S. Shin, H. Park, S. Choi, and W. Kwon, "Packet Error Rate Analysis of ZigBee under WLAN and Bluetooth Interferences", IEEE Transactions on Wireless Communications, vol. 6, no. 8, pp. 2825-2830, 2007.
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.8
, pp. 2825-2830
-
-
Shin, S.1
Park, H.2
Choi, S.3
Kwon, W.4
-
38
-
-
79951960033
-
Developing zigbee deployment guideline under wifi interference for smart grid applications
-
P. Yi, A. Iwayemi, and C. Zhou, "Developing ZigBee Deployment Guideline under WiFi Interference for Smart Grid Applications", IEEE Transactions on Smart Grid, vol. 2, no. 1, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.1
-
-
Yi, P.1
Iwayemi, A.2
Zhou, C.3
-
39
-
-
84856337260
-
An analytical energy consumption model for packet transfer over wireless links
-
J. Vazifehdan, R. Prasad, M. Jacobsson, and I. Niemegeers, "An Analytical Energy Consumption Model for Packet Transfer over Wireless Links", IEEE Communications Letters, vol. 16, no. 1, pp. 30-33, 2012.
-
(2012)
IEEE Communications Letters
, vol.16
, Issue.1
, pp. 30-33
-
-
Vazifehdan, J.1
Prasad, R.2
Jacobsson, M.3
Niemegeers, I.4
-
42
-
-
0003535936
-
-
John Wiley and Sons, Inc., Hoboken, New Jersey, 2nd edition
-
A. Agresti, Categorical Data Analysis. John Wiley and Sons, Inc., Hoboken, New Jersey, 2nd edition, 2002.
-
(2002)
Categorical Data Analysis
-
-
Agresti, A.1
|