-
1
-
-
0033362595
-
The origins of ubiquitous computing research at PARC in the late 1980s
-
Dec.
-
M. Weiser, R. Gold, J. S. Brown, "The origins of ubiquitous computing research at PARC in the late 1980s", IBM Systems Journal, Vol. 38 No. 4, pp. 693-696, Dec. 1999.
-
(1999)
IBM Systems Journal
, vol.38
, Issue.4
, pp. 693-696
-
-
Weiser, M.1
Gold, R.2
Brown, J.S.3
-
2
-
-
75449104170
-
Smart objects as building blocks for the Internet of things
-
G. Kortuem, et al.: "Smart objects as building blocks for the Internet of things", IEEE Internet Computing, Vol. 14, No.1, pp. 44-51, 2009.
-
(2009)
IEEE Internet Computing
, vol.14
, Issue.1
, pp. 44-51
-
-
Kortuem, G.1
-
3
-
-
84855410073
-
Ubicomp systems at 20: Progress, opportunities, and challenges
-
Jan.
-
R. Caceres and A. Friday, "Ubicomp systems at 20: Progress, opportunities, and challenges", IEEE Pervasive Computing, Vol. 11, No. 1, pp. 14-21, Jan. 2012.
-
(2012)
IEEE Pervasive Computing
, vol.11
, Issue.1
, pp. 14-21
-
-
Caceres, R.1
Friday, A.2
-
4
-
-
80955160447
-
That 'Internet of Things' thing
-
[Online] June. (04-04-2014)
-
K. Ashton. "That 'Internet of Things' thing." RFID Journal.[Online] June 2009. Available: http://www.rfidjournal.com/article/view/ 4986 (04-04-2014)
-
(2009)
RFID Journal
-
-
Ashton, K.1
-
5
-
-
48649100154
-
ITU internet reports 2005: The internet of things
-
Strategy, I. T. U., and Policy Unit
-
Strategy, I. T. U., and Policy Unit. "ITU Internet Reports 2005: The internet of things." Geneva: International Telecommunication Union (ITU) 2005.
-
(2005)
Geneva: International Telecommunication Union (ITU)
-
-
-
6
-
-
84855778569
-
The internet of things - promise for the future? An introduction
-
May
-
L. Coetzee and J. Eksteen, "The Internet of Things - Promise for the Future? An Introduction", in IST-Africa Conference Proceedings, May 2011.
-
(2011)
IST-Africa Conference Proceedings
-
-
Coetzee, L.1
Eksteen, J.2
-
7
-
-
77956877124
-
The internet of things: A survey
-
Oct.
-
L. Atzori, A. Iera and G. Morabito, "The Internet of Things: A Survey", Computer Networks, Vol. 54, No. 15, pp. 2787-2805, Oct. 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
10
-
-
50949122471
-
-
IETF, IETF [Online]. (17-04)
-
IETF, "The Internet Engineering Task Force", IETF [Online]. Available: http://www.ietf.org (17-04-2014).
-
(2014)
The Internet Engineering Task Force
-
-
-
11
-
-
55849150575
-
On the IEEE 802. 15. 4 MAC layer attacks: GTS attack
-
R. Sokullu, O. Dagdeviren, and I. Korkmaz, "On the IEEE 802. 15. 4 MAC Layer Attacks: GTS Attack", International Conference on Sensor Technologies and Applications, vol. 0, pp. 673-678, 2008.
-
(2008)
International Conference on Sensor Technologies and Applications
, vol.0
, pp. 673-678
-
-
Sokullu, R.1
Dagdeviren, O.2
Korkmaz, I.3
-
12
-
-
33749037166
-
A framework for MAC layer misbehavior detection in wireless networks
-
S. Radosavac, J.S. Baras, and I. Koutsopoulos, "A Framework for MAC Layer Misbehavior Detection in Wireless Networks", in Proc. of the 4th ACM Workshop on Wireless security, pp. 33-42, 2005.
-
(2005)
Proc. of the 4th ACM Workshop on Wireless Security
, pp. 33-42
-
-
Radosavac, S.1
Baras, J.S.2
Koutsopoulos, I.3
-
13
-
-
33845762444
-
Detecting IEEE 802.11 MAC layer misbehavior in Ad Hoc networks: Robust strategies against individual and colluding attackers
-
S. Radosavac, A.A. Crdenas, J.S. Baras, and G.V. Moustakides, "Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies against Individual and Colluding Attackers", Journal of Computer Security, special Issue on Security of Ad Hoc and Sensor Networks, vol.15, no.1, pp. 103-128, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 103-128
-
-
Radosavac, S.1
Crdenas, A.A.2
Baras, J.S.3
Moustakides, G.V.4
-
14
-
-
33751531045
-
Security services and enhancements in the IEEE 802.15.4 wireless sensor networks
-
Y. Xiao, S. Sethi, H.H. Chen, and B. Sun, "Security Services and Enhancements in the IEEE 802.15.4 Wireless Sensor Networks", in Proc. of IEEE GLOBECOM, vol.3, 2005.
-
(2005)
Proc. of IEEE GLOBECOM
, vol.3
-
-
Xiao, Y.1
Sethi, S.2
Chen, H.H.3
Sun, B.4
-
15
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming Sensor Networks: Attack and Defense Strategies", IEEE Network, vol.20, no.3, pp. 41-47, 2006.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
16
-
-
33745058163
-
Link-layer jamming attacks on S-MAC
-
Y.W. Law, P. Hartel, J. den Hartog, and P. Havinga, "Link-Layer Jamming Attacks on S-MAC", in Proc. of IEEE WSN, pp.217-225, 2005.
-
(2005)
Proc. of IEEE WSN
, pp. 217-225
-
-
Law, Y.W.1
Hartel, P.2
Den Hartog, J.3
Havinga, P.4
-
18
-
-
36348983213
-
On security attacks in health-care WSNs implemented on 802.15.4 beacon enabled clusters
-
J. Misic, F. Amini, and M. Khan, "On Security Attacks in Health-care WSNs Implemented on 802.15.4 Beacon Enabled Clusters", in Proc. of IEEE Consumer Communications and Networking Conference, pp. 741-745, 2007.
-
(2007)
Proc. of IEEE Consumer Communications and Networking Conference
, pp. 741-745
-
-
Misic, J.1
Amini, F.2
Khan, M.3
-
19
-
-
55849133917
-
An investigation on IEEE 802.15.4 MAC layer attacks
-
R. Sokullu, I. Korkmaz, O. Dagdeviren, A. Mitseva, and N.R. Prasad, "An Investigation on IEEE 802.15.4 MAC Layer Attacks", in Proc. of WPMC, 2007.
-
(2007)
Proc. of WPMC
-
-
Sokullu, R.1
Korkmaz, I.2
Dagdeviren, O.3
Mitseva, A.4
Prasad, N.R.5
-
21
-
-
84925368904
-
IEEE 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington, DC, USA, August
-
J. Bellardo, S. Savage, "IEEE 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions", In Proceedings of the USENIX Security Symposium, Washington, DC, USA, August 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
22
-
-
4544324338
-
DOMINO:A system to detect greedy behavior in IEEE 802.11 hotspots
-
Boston, MA, USA, June
-
M. Raya, J.P. Hubaux and I. Aad,"DOMINO:A system to detect greedy behavior in IEEE 802.11 hotspots", In Proceedings of the Second International Conference on Mobile Systems, Applications and Services (MobiSys2004), Boston, MA, USA, June 2004.
-
(2004)
Proceedings of the Second International Conference on Mobile Systems, Applications and Services (MobiSys2004)
-
-
Raya, M.1
Hubaux, J.P.2
Aad, I.3
-
23
-
-
33749037166
-
A framework for MAC protocol misbehavior detection in wireless networks
-
Cologne, Germany; August
-
S. Radosavac, J.S. Baras and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks", In Proceedings of the 4th ACM Workshop on Wireless Security, Cologne, Germany; pp. 33-42, August 2005.
-
(2005)
Proceedings of the 4th ACM Workshop on Wireless Security
, pp. 33-42
-
-
Radosavac, S.1
Baras, J.S.2
Koutsopoulos, I.3
-
24
-
-
1542360013
-
Detection and handling of mac layer misbehavior in wireless networks
-
San Francisco, CA, USA, June
-
P. Kyasanur and N. Vaidya, "Detection and handling of mac layer misbehavior in wireless networks", In Proceedings of the International Conference on Dependable Systems and Networks, San Francisco, CA, USA, June 2003.
-
(2003)
Proceedings of the International Conference on Dependable Systems and Networks
-
-
Kyasanur, P.1
Vaidya, N.2
-
25
-
-
84900432923
-
-
IETF 6TiSCH WG, November 21
-
T. Watteynek, M.R. Palattella and L.A. Grieco, "Using IEEE802.15.4e TSCH in an LLN context: Overview, Problem Statement and Goals, draft-ietf-6tisch-tsch-00 (work in progress)", IETF 6TiSCH WG, November 21, 2013.
-
(2013)
Using IEEE 802.15.4e TSCH in an LLN context: Overview, problem statement and goals, draft-ietf-6tisch-tsch-00 (work in progress)
-
-
Watteynek, T.1
Palattella, M.R.2
Grieco, L.A.3
-
26
-
-
84900460231
-
-
IETF 6TiSCH WG, March 22
-
S. Chasco, S. Das, R. Marin-Lopez, Y. Ohba, P. Thubert, and A. Yegin, "Security Framework and Key Management Protocol Requirements for 6TSCH, draft-ohba-6tisch-security-01 (work in progress)", IETF 6TiSCH WG, March 22, 2014.
-
(2014)
Security Framework and Key Management Protocol Requirements for 6TSCH, draft-ohba-6tisch-security-01 (work in progress)
-
-
Chasco, S.1
Das, S.2
Marin-Lopez, R.3
Ohba, Y.4
Thubert, P.5
Yegin, A.6
-
27
-
-
84900399397
-
-
IETF 6TiSCH WG, December 14
-
G. Piro, G. Boggia and L. A. Grieco, "A standard compliant security framework for Low-power and Lossy Networks, draft-piro-6tisch-security-issues-01 (work in progress)", IETF 6TiSCH WG, December 14, 2013.
-
(2013)
A standard compliant security framework for Low-power and Lossy Networks, draft-piro-6tisch-security-issues-01 (work in progress)
-
-
Piro, G.1
Boggia, G.2
Grieco, L.A.3
|