暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[2] Sugata Sanyal,et al. Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services , 2013, ArXiv.
[3] D. Lazer,et al. Inferring Social Network Structure using Mobile Phone Data , 2006 .
[4] Dharma P. Agrawal,et al. Jigsaw-based secure data transfer over computer networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[5] Benjamin K. S. Khoo,et al. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[6] Sugata Sanyal,et al. A new protocol to counter online dictionary attacks , 2006, Comput. Secur..
[7] Rolf Clauberg,et al. RFID and Sensor Networks From Sensor / Actuator to Business Application , 2004 .
[8] Peter Kulchyski. and , 2015 .
[10] Kalpana Sharma,et al. A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .
[11] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[12] Mike Burmester,et al. RFID Security : Attacks , Countermeasures and Challenges , 2007 .
[13] Selwyn Piramuthu,et al. Security/privacy of wearable fitness tracking IoT devices , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).
[14] Qinghan Xiao,et al. RFID Technology, Security Vulnerabilities, and Countermeasures , 2009 .
[15] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[16] Jaydip Sen,et al. Security and Privacy Challenges in Cognitive Wireless Sensor Networks , 2013, ArXiv.
[17] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[18] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.
[19] Sugata Sanyal,et al. The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[20] Charu C. Aggarwal,et al. Integrating Sensors and Social Networks , 2011, Social Network Data Analytics.
[21] H. Schulzrinne,et al. An IP traceback mechanism for reflective DoS attacks , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[22] Ahmad Alkhatib,et al. Wireless Sensor Network Architecture , 2012 .
[23] Abhishek Pandey,et al. A Survey on Wireless Sensor Networks Security , 2010 .
[24] Amit Kumar Mishra,et al. ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .
[25] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[26] Sugata Sanyal,et al. RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks , 2013, ArXiv.
[27] Zornitza Genova Prodanoff. Optimal frame size analysis for framed slotted ALOHA based RFID networks , 2010, Comput. Commun..
[28] Al-Sakib Khan Pathan. Denial of service in wireless sensor networks: issues and challenges , 2010 .
[29] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[30] Jyoteesh Malhotra,et al. Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .
[31] Bingwu Liu,et al. The visions, technologies, applications and security issues of Internet of Things , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[32] Sugata Sanyal,et al. An LSB Data Hiding Technique Using Prime Numbers , 2007, Third International Symposium on Information Assurance and Security.
[33] Djamal Zeghlache,et al. Towards a secure social sensor network , 2013, 2013 IEEE International Conference on Bioinformatics and Biomedicine.