Wireless Sensor Networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. Tenet: An Architecture for Tiered Embedded Networks , 2005 .
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] J. Heidemann,et al. Experimental Analysis of Concurrent Packet Transmissions in Low-Power Wireless Networks , 2005 .
[4] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[5] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] Deborah Estrin,et al. A sensor network application construction kit (SNACK) , 2004, SenSys '04.
[10] David E. Culler,et al. Active sensor networks , 2005, NSDI.
[11] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[12] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[13] David L Adamy,et al. Ew 101: A First Course in Electronic Warfare , 2001 .
[14] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[15] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[16] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.