-
1
-
-
84938847954
-
An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs
-
Y. Hu and A. Liu, "An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs," The Computer Journal, vol.58, no.8, pp.1747-1762, 2015.
-
(2015)
The Computer Journal
, vol.58
, Issue.8
, pp. 1747-1762
-
-
Hu, Y.1
Liu, A.2
-
2
-
-
84961727422
-
Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks
-
M. Dong, K. Ota, A. Liu, and M. Guo, "Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks," IEEE Trans. Parallel Distrib. Syst., vol.27, no.1, pp.225-236, 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.1
, pp. 225-236
-
-
Dong, M.1
Ota, K.2
Liu, A.3
Guo, M.4
-
3
-
-
84984709001
-
Mobile target detection in wireless sensor networks with adjustable sensing frequency
-
Y. Hu, M. Dong, K. Ota, et al., "Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency," IEEE System Journal, 2014.
-
(2014)
IEEE System Journal
-
-
Hu, Y.1
Dong, M.2
Ota, K.3
-
4
-
-
84877772973
-
Comprehensive study of selective forwarding attack in wireless sensor networks
-
Z.K. Wazir, X. Yang, Y.A. Mohammed, and A. Quratulain, "Comprehensive study of selective forwarding attack in wireless sensor networks," International Journal of Computer Network and Information Security (IJCNIS), vol.3, no.1, p.1-10, 2011.
-
(2011)
International Journal of Computer Network and Information Security (IJCNIS)
, vol.3
, Issue.1
, pp. 1-10
-
-
Wazir, Z.K.1
Yang, X.2
Mohammed, Y.A.3
Quratulain, A.4
-
5
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
B. Xiao, B. Yu, and C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," Journal of Parallel and Distributed Computing, vol.67, no.11, pp.1218-1230, 2007.
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
6
-
-
82555196697
-
BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
-
R.R. Lu, X. Lin, H. Zhu, X. Liang, and X. Shen, "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol.23, no.1, pp.32-43, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.1
, pp. 32-43
-
-
Lu, R.R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.5
-
7
-
-
84925063940
-
An incentive game based evolutionary model for crowd sensing networks
-
X. Liu, K. Ota, A. Liu, and Z. Chen, "An incentive game based evolutionary model for crowd sensing networks," Peer-to-Peer Networking and Applications, vol.9, no.4, pp.692-711, 2016.
-
(2016)
Peer-to-Peer Networking and Applications
, vol.9
, Issue.4
, pp. 692-711
-
-
Liu, X.1
Ota, K.2
Liu, A.3
Chen, Z.4
-
8
-
-
84963804113
-
Service pricing decision in cyber-physical systems: Insights from game theory
-
X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu, "Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory," IEEE Transactions on Services Computing, vol.9, no.2, pp.186-198, 2016.
-
(2016)
IEEE Transactions on Services Computing
, vol.9
, Issue.2
, pp. 186-198
-
-
Liu, X.1
Dong, M.2
Ota, K.3
Hung, P.4
Liu, A.5
-
9
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol.1, no.2, pp.293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
10
-
-
48649095029
-
An efficient countermea-sure to the selective forwarding attack in wireless sensor networks
-
Oct. 2007
-
H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermea-sure to the selective forwarding attack in wireless sensor networks," Proc. IEEE TENCON 2007, pp.1-4, Oct. 2007.
-
(2007)
Proc. IEEE TENCON
, pp. 1-4
-
-
Sun, H.-M.1
Chen, C.-M.2
Hsiao, Y.-C.3
-
11
-
-
80053250954
-
Improved message communication scheme in selective forwarding attack detection method
-
J.W. Kim, S.Y. Moon, T.H. Cho, et al., "Improved message communication scheme in selective forwarding attack detection method," 7th International Conference on Digital Content, Multimedia Technology and its Applications (IDCTA), pp.169-172, 2011.
-
(2011)
7th International Conference on Digital Content, Multimedia Technology and Its Applications (IDCTA)
, pp. 169-172
-
-
Kim, J.W.1
Moon, S.Y.2
Cho, T.H.3
-
12
-
-
84964414645
-
LSCD: A low storage clone detecting protocol for cyber-physical systems
-
M. Dong, K. Ota, L.T. Yang, A. Liu, and M. Guo, "LSCD: A Low Storage Clone Detecting Protocol for Cyber-Physical Systems," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol.35, no.5, pp.712-723, 2016.
-
(2016)
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst.
, vol.35
, Issue.5
, pp. 712-723
-
-
Dong, M.1
Ota, K.2
Yang, L.T.3
Liu, A.4
Guo, M.5
-
13
-
-
84963850053
-
Energy and memory efficient clone detection in wireless sensor networks
-
Z. Zheng, A. Liu, L.X. Cai, Z. Chen, and X.S. Shen, "Energy and Memory Efficient Clone Detection in Wireless Sensor Networks," IEEE Trans. Mobile Comput., vol.15, no.5, pp.1130-1143, 2016.
-
(2016)
IEEE Trans. Mobile Comput.
, vol.15
, Issue.5
, pp. 1130-1143
-
-
Zheng, Z.1
Liu, A.2
Cai, L.X.3
Chen, Z.4
Shen, X.S.5
-
14
-
-
84902184986
-
Mobility and intruder prior information improving the barrier coverage of sparse sensor networks
-
S. He, J. Chen, X. Li, et al., "Mobility and intruder prior information improving the barrier coverage of sparse sensor networks," IEEE Trans. Mobile Comput., vol.13, no.6, pp.1268-1282, 2014.
-
(2014)
IEEE Trans. Mobile Comput.
, vol.13
, Issue.6
, pp. 1268-1282
-
-
He, S.1
Chen, J.2
Li, X.3
|