-
1
-
-
34548850872
-
A survey on clustering algorithms for wireless sensor networks
-
A. Abbasi and M. Younis. A Survey on Clustering Algorithms for Wireless Sensor Networks. Computer Communications, 30(14- 15):2826-2841, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.14-15
, pp. 2826-2841
-
-
Abbasi, A.1
Younis, M.2
-
7
-
-
84944048132
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 18-38, 2001.
-
(2001)
International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
10
-
-
0019928314
-
Elections in a distributed computing system
-
Jan
-
H. Garcia-Molina. Elections in a Distributed Computing System. IEEE Transactions on Computers, C-31(1):48-59, Jan 1982.
-
(1982)
IEEE Transactions on Computers
, vol.C-31
, Issue.1
, pp. 48-59
-
-
Garcia-Molina, H.1
-
11
-
-
33747289360
-
Routeguard: An intrusion detection and response system for mobile ad hoc networks
-
A. Hasswa, M. Zulkernine, and H. Hassanein. Routeguard: An Intrusion Detection and Response System for Mobile Ad Hoc Networks. In IEEE International Conference on Wireless And Mobile Computing, Networking And Communications (WiMob), pages 336-343, 2005.
-
(2005)
IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
, pp. 336-343
-
-
Hasswa, A.1
Zulkernine, M.2
Hassanein, H.3
-
12
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks
-
M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao. Adaptive Security Design with Malicious Node Detection in Cluster-based Sensor Networks. Computer Communications, 30(11-12):2385-2400, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2385-2400
-
-
Hsieh, M.-Y.1
Huang, Y.-M.2
Chao, H.-C.3
-
13
-
-
51249093755
-
Seluge: Secure and DoSResistant code dissemination in wireless sensor networks
-
S. Hyun, P. Ning, A. Liu, and W. Du. Seluge: Secure and DoSResistant Code Dissemination in Wireless Sensor Networks. In International Conference on Information Processing in Sensor Networks (IPSN), pages 445-456, 2008.
-
(2008)
International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 445-456
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
15
-
-
77958150562
-
Wireless sensor networks for healthcare
-
J. Ko, C. Lu, M. Srivastava, J. Stankovic, A. Terzis, and M. Welsh. Wireless Sensor Networks for Healthcare. Proceedings of the IEEE, 98(11):1947-1960, 2010.
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.11
, pp. 1947-1960
-
-
Ko, J.1
Lu, C.2
Srivastava, M.3
Stankovic, J.4
Terzis, A.5
Welsh, M.6
-
18
-
-
84899595286
-
-
P. Levis. Collection. http://www.tinyos.net/tinyos-2.x/doc/html/tep119.html.
-
Collection
-
-
Levis, P.1
-
19
-
-
38049128698
-
SAID: A self-adaptive intrusion detection system in wireless sensor networks
-
J. Ma, S. Zhang, Y. Zhong, and X. Tong. SAID: A Self-adaptive Intrusion Detection System in Wireless Sensor Networks. In International Conference on Information Security Applications, pages 60-73, 2007.
-
(2007)
International Conference on Information Security Applications
, pp. 60-73
-
-
Ma, J.1
Zhang, S.2
Zhong, Y.3
Tong, X.4
-
20
-
-
84914147486
-
-
CoRR, abs/1209.1678
-
M. Mamun, A. Kabir, M. Hossen, and R. Khan. Policy based intrusion detection and response system in hierarchical WSN architecture. CoRR, abs/1209.1678, 2012.
-
(2012)
Policy Based Intrusion Detection and Response System in Hierarchical WSN Architecture
-
-
Mamun, M.1
Kabir, A.2
Hossen, M.3
Khan, R.4
-
21
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In International Conference on Mobile Computing and Networking (MobiCom), pages 255-265, 2000.
-
(2000)
International Conference on Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
24
-
-
84866494570
-
PowerTOSSIM Z: Realistic energy modelling for wireless sensor network environments
-
E. Perla, A. O. Catháin, R. S. Carbajo, M. Huggard, and C. McGoldrick. PowerTOSSIM Z: Realistic Energy Modelling for Wireless Sensor Network Environments. In ACMWorkshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, pages 35-42, 2008.
-
(2008)
ACMWorkshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks
, pp. 35-42
-
-
Perla, E.1
Catháin, A.O.2
Carbajo, R.S.3
Huggard, M.4
McGoldrick, C.5
-
32
-
-
77951265748
-
Adaptive security provision for increased energy efficiency in wireless sensor networks
-
M. Younis, N. Krajewski, and O. Farrag. Adaptive Security Provision for Increased Energy Efficiency in Wireless Sensor Networks. In IEEE Conference on Local Computer Networks, pages 999-1005, 2009.
-
(2009)
IEEE Conference on Local Computer Networks
, pp. 999-1005
-
-
Younis, M.1
Krajewski, N.2
Farrag, O.3
|