본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

결과 내 검색

동의어 포함

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
A Cluster-based QoS Multicast Routing Protocol for Scalable MANETs Mohammad M. Qabajeh, Aisha H. Adballa, Othman O. Khalifa, Liana K. Qabajeh pp.741-762
Heuristic Algorithms for Optimization of Energy Consumption in Wireless Access Networks Josip Lorincz, Antonio Capone, Dinko Begu?i? pp.626-648
Location-Based Spiral Clustering Algorithm for Avoiding Inter-Cluster Collisions in WSNs 윤영욱, 최재혁, 유상조 pp.665-683
An Energy Efficient Multichannel MAC Protocol for QoS Provisioning in MANETs S. M. Kamruzzaman, Md. Abdul Hamid pp.684-702
Novel schemes of CQI Feedback Compression based on Compressive Sensing for Adaptive OFDM Transmission Yongjie Li, Rongfang Song pp.703-719
Analysis and Optimization of Cooperative Spectrum Sensing with Noisy Decision Transmission Quan Liu, Yunwei Guo, Siyang Liu, Jun Gao pp.649-664
Provisioning QoS for WiFi-enabled Portable Devices in Home Networks 박은찬, 곽노준, 이석규, 김종국, 김황남 pp.720-740
Texture-based Hatching for Color Image and Video 양희경, 민경하 pp.763-781
Probabilistic Background Subtraction in a Video-based Recognition System 이희성, 홍성준, 김은태 pp.782-804
Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks : A Survey 홍성혁, 임선호, 송재기 pp.805-821
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting Meng-Hui Lim, Bok-Min Goi, 이상곤 pp.822-839
Local Linear Transform and New Features of Histogram Characteristic Functions for Steganalysis of Least Significant Bit Matching Steganography Ergong Zheng, Tao Zhang, Xijian Ping pp.840-855
Reversible Watermarking Using Adaptive Edge-Guided Interpolation Ningjie Dai, Guorui Feng, Qian Zengng pp.856-873

참고문헌 (17건) : 자료제공( 네이버학술정보 )

참고문헌 목록에 대한 테이블로 번호, 참고문헌, 국회도서관 소장유무로 구성되어 있습니다.
번호 참고문헌 국회도서관 소장유무
1 IEEE Computer Society Election 네이버 미소장
2 Secure routing in wireless sensor networks: attacks and countermeasures 네이버 미소장
3 A survey on sensor networks 네이버 미소장
4 A survey of security issues in wireless sensor networks 네이버 미소장
5 W. Xu, W. Trappe, Y. Zhang and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” in Proc. MobiHoc, pp. 46–57, 2005. Article (CrossRef Link) 미소장
6 Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses 네이버 미소장
7 R. Kravets and P. Krishnan, “Power Management Techniques for Mobile Communication,” in Proc. IEEE MOBICOM, pp. 157-168, 1998. Article (CrossRef Link) 미소장
8 T. Martin, M. Hsiao, D. Ha and J. Krishnaswami, “Denial-of-Service Attacks on Battery-powered Mobile Computers,” in Proc. PerCom, pp. 309-318, 2004. Article (CrossRef Link) 미소장
9 D. Raymond, R. Marchany, M. Brownfield and S. Midkiff, “Effects of Denial of Sleep Attacks on Wireless Sensor Newtork MAC Protocols,” in Proc. Workshop on Information Assurance, pp. 297-304, 2006. Article (CrossRef Link) 미소장
10 Denial of service in sensor networks 네이버 미소장
11 C. L. Schuba, I. V. Krsul, M. g. Kuhn, E. H. Spafford, A. Sundaram and D. Zamboni, “Analysis of a Denial of Service Attack on TCP,” in Proc. IEEE Symposium on Security and Privacy, pp. 208-223, 1997. Article (CrossRef Link) 미소장
12 T. Aura, P. Nikander and J. Leiwo, “DOS-Resistant Authentication with Client Puzzles,” in Proc. Security Protocols Workshop, pp. 170-177, 2000. Article (CrossRef Link) 미소장
13 L. Zhao, X. Zhao, Q. Long and Z. Yan, “A type system for the relational calculus of object systems,” 11th IEEE International Conference on ICECCS 2006, pp.10. Sep. 2006. Article (CrossRef Link) 미소장
14 Computational intelligence methods for process control: fed-batch fermentation application 네이버 미소장
15 S. Cheung and K.N. Levitt, “Protecting Routing Infrastructures from Denial of Services Using Cooperative Intrusion Detection”, in Proc. Workshop on New Security Paradigms, ACM Press, New York, pp. 94 – 106, 1997. Article (CrossRef Link) 미소장
16 Gutierrez, J.A.; Naeve, M., Callaway, E., Bourgeois, M., Mitter, V. and Heile, B., “IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks,” Network, IEEE, vol. 15, no. 5, pp.12-19, Sep/Oct. 2001. Article (CrossRef Link) 미소장
17 Wormhole attacks in wireless networks 네이버 미소장