-
1
-
-
78650759569
-
On modeling energysecurity trade-offs for distributed monitoring in wireless ad hoc networks
-
November
-
S. Mehmet Futaci, K. Jaffres Runser, and C. Comaniciu. On modeling energysecurity trade-offs for distributed monitoring in wireless ad hoc networks, MILCOM, November 2008, pp. 1-7.
-
(2008)
MILCOM
, pp. 1-7
-
-
Mehmet Futaci, S.1
Jaffres Runser, K.2
Comaniciu, C.3
-
4
-
-
60649107168
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
October 2006, Pisa, Italy.
-
Y. Liu, C. Comaniciu, and H. Man. A bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of GameNets (Workshop on Game Theory for Networks), October 2006, Pisa, Italy.
-
Proceedings of GameNets (Workshop on Game Theory for Networks)
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
5
-
-
56749096465
-
A moderate to robust game theoretical model for intrusion detection in MANETs
-
October 2008
-
H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya. A moderate to robust game theoretical model for intrusion detection in MANETs, International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB), October 2008, pp. 608-612.
-
International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB)
, pp. 608-612
-
-
Otrok, H.1
Mohammed, N.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
7
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
N. Potlapally, N. Ravi, S. Raghunathan, and N. Jha. Analyzing the energy consumption of security protocols. International Symposium on Low Power Electronics and Design, 30-35, 2003.
-
(2003)
International Symposium on Low Power Electronics and Design
, pp. 30-35
-
-
Potlapally, N.1
Ravi, N.2
Raghunathan, S.3
Jha, N.4
-
10
-
-
34047194957
-
An energy-aware random pairwise keys scheme in wireless sensor networks
-
Y. Bidi, C. Huifang, Z.Wendao, and Q. Peiliang. An energy-aware random pairwise keys scheme in wireless sensor networks. IEEE Sixth World Congress on Intelligent Control and Automation (WCICA), 2006, pp. 114-118.
-
(2006)
IEEE Sixth World Congress on Intelligent Control and Automation (WCICA)
, pp. 114-118
-
-
Bidi, Y.1
Huifang, C.2
Wendao, Z.3
Peiliang, Q.4
-
11
-
-
55949107536
-
Reducing radio energy consumption of key management protocols for wireless sensor networks
-
August
-
B.-C.C. Lai, D.D. Hwang, S.P. Kim, and I. Verbauwhede. Reducing radio energy consumption of key management protocols for wireless sensor networks. IEEE International Symposium on Low Power Electronics and Design, ISLPED, August 2004, pp. 351-356.
-
(2004)
IEEE International Symposium on Low Power Electronics and Design, ISLPED
, pp. 351-356
-
-
Lai, B.-C.C.1
Hwang, D.D.2
Kim, S.P.3
Verbauwhede, I.4
-
12
-
-
52949115365
-
Analyzing energy and time overhead of security mechanisms in wireless sensor networks
-
June
-
P. Trakadas, T. Zahariadis, H.C. Leligou, S. Voliotis, and K. Papadopoulos. Analyzing energy and time overhead of security mechanisms in wireless sensor networks. IEEE International Conference on Systems, Signals and Image Processing (IWSSIP), June 2008, pp. 137-140.
-
(2008)
IEEE International Conference on Systems, Signals and Image Processing (IWSSIP)
, pp. 137-140
-
-
Trakadas, P.1
Zahariadis, T.2
Leligou, H.C.3
Voliotis, S.4
Papadopoulos, K.5
-
22
-
-
84990885504
-
-
Freescale Semiconductor and EBV Electronics, Istanbul, Turkey, February
-
Seminar notes. ZigBee technical training seminar. Freescale Semiconductor and EBV Electronics, Istanbul, Turkey, February 2005.
-
(2005)
ZigBee technical training seminar
-
-
-
23
-
-
84990901179
-
Efficient cooperative detection in wireless sentinel networks
-
March 2010, Princeton, NJ.
-
Q. Shi and C. Comaniciu. Efficient cooperative detection in wireless sentinel networks. In Proceedings of CISS, March 2010, Princeton, NJ.
-
Proceedings of CISS
-
-
Shi, Q.1
Comaniciu, C.2
|