| 1 |
IEEE Computer Society Election  |
미소장 |
| 2 |
Secure routing in wireless sensor networks: attacks and countermeasures  |
미소장 |
| 3 |
A survey on sensor networks  |
미소장 |
| 4 |
A survey of security issues in wireless sensor networks  |
미소장 |
| 5 |
W. Xu, W. Trappe, Y. Zhang and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” in Proc. MobiHoc, pp. 46–57, 2005. Article (CrossRef Link) |
미소장 |
| 6 |
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses  |
미소장 |
| 7 |
R. Kravets and P. Krishnan, “Power Management Techniques for Mobile Communication,” in Proc. IEEE MOBICOM, pp. 157-168, 1998. Article (CrossRef Link) |
미소장 |
| 8 |
T. Martin, M. Hsiao, D. Ha and J. Krishnaswami, “Denial-of-Service Attacks on Battery-powered Mobile Computers,” in Proc. PerCom, pp. 309-318, 2004. Article (CrossRef Link) |
미소장 |
| 9 |
D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, “Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols,” in Proc. Workshop on Information Assurance, pp. 297-304, 2006. Article (CrossRef Link) |
미소장 |
| 10 |
Denial of service in sensor networks  |
미소장 |
| 11 |
C. L. Schuba, I. V. Krsul, M. g. Kuhn, E. H. Spafford, A. Sundaram and D. Zamboni, “Analysis of a Denial of Service Attack on TCP,” in Proc. IEEE Symposium on Security and Privacy, pp. 208-223, 1997. Article (CrossRef Link) |
미소장 |
| 12 |
T. Aura, P. Nikander and J. Leiwo, “DOS-Resistant Authentication with Client Puzzles,” in Proc. Security Protocols Workshop, pp. 170-177, 2000. Article (CrossRef Link) |
미소장 |
| 13 |
L. Zhao, X. Zhao, Q. Long and Z. Yan, “A type system for the relational calculus of object systems,” 11th IEEE International Conference on ICECCS 2006, pp.10. Sep. 2006. Article (CrossRef Link) |
미소장 |
| 14 |
Computational intelligence methods for process control: fed-batch fermentation application  |
미소장 |
| 15 |
S. Cheung and K.N. Levitt, “Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection”, in Proc. Workshop on New Security Paradigms, ACM Press, New York, pp. 94 – 106, 1997. Article (CrossRef Link) |
미소장 |
| 16 |
Gutierrez, J.A.; Naeve, M., Callaway, E., Bourgeois, M., Mitter, V. and Heile, B., “IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks,” Network, IEEE, vol. 15, no. 5, pp.12-19, Sep/Oct. 2001. Article (CrossRef Link) |
미소장 |
| 17 |
Wormhole attacks in wireless networks  |
미소장 |