Hello Flood Attack and its Countermeasures in Wireless Sensor Networks
暂无分享,去创建一个
[1] David C. Yen,et al. Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..
[2] Kun-Ming Yu,et al. A Density-Based Algorithm for Redundant Reader Elimination in a RFID Network , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[3] W. W. Royce,et al. Managing the development of large software systems , 1970 .
[4] Dekang Lin,et al. An Information-Theoretic Definition of Similarity , 1998, ICML.
[5] Martha Palmer,et al. Verb Semantics and Lexical Selection , 1994, ACL.
[6] Ananth Grama,et al. Redundant reader elimination in RFID systems , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[7] V. Daniel Hunt,et al. RFID: A Guide to Radio Frequency Identification , 2007 .
[8] Kent L. Beck,et al. Extreme programming explained - embrace change , 1990 .
[9] Torsten Suel,et al. Design and implementation of a high-performance distributed Web crawler , 2002, Proceedings 18th International Conference on Data Engineering.
[10] Mohammad Ilyas,et al. Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[11] Marc Najork,et al. Mercator: A scalable, extensible Web crawler , 1999, World Wide Web.
[12] Giuseppe Pirrò,et al. A semantic similarity metric combining features and intrinsic information content , 2009, Data Knowl. Eng..
[13] Tony Veale,et al. An Intrinsic Information Content Metric for Semantic Similarity in WordNet , 2004, ECAI.
[14] Tarek A. El-Sadany,et al. An Arabic Morphological System , 1989, IBM Syst. J..
[15] Daniel W. Engels,et al. Colorwave: a MAC for RFID reader networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[16] Daniel M. Dobkin,et al. The RF in RFID: Passive UHF RFID in Practice , 2007 .
[17] Graeme Hirst,et al. Semantic distance in WordNet: An experimental, application-oriented evaluation of five measures , 2004 .
[18] Troels Andreasen,et al. Domain-Specific Similarity and Retrieval , 2005 .
[19] Fouad A. Tobagi,et al. Capacity of an IEEE 802.11b wireless LAN supporting VoIP , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[20] Kimmo Koskenniemi,et al. A General Computational Model for Word-Form Recognition and Production , 1984, ACL.
[21] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[22] Ching-Hsien Hsu,et al. A Layered Optimization Approach for Redundant Reader Elimination in Wireless RFID Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).
[23] Liu Hongwei,et al. Malicious node detection in wireless sensor networks using time series analysis on node reputation , 2012 .
[24] Luis E. Palafox,et al. Chapter XXXIV Security in Wireless Sensor Networks , 2008 .
[25] Philip Resnik,et al. Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language , 1999, J. Artif. Intell. Res..
[26] Henrik Bulskov Styltsvig. Ontology-based Information Retrieval , 2006 .
[27] Hadj Ahmed Cherkaoui. A Computational Lexeme-Based Treatment of Arabic Morphology , 2001 .
[28] G. Miller,et al. Contextual correlates of semantic similarity , 1991 .
[29] Jun-Liang Chen,et al. The Simulation and Analysis of Algorithms for Redundant Reader Elimination in RFID System , 2009, 2009 Third UKSim European Symposium on Computer Modeling and Simulation.
[30] Giuseppe Portelli,et al. Design and implementation of a Bluetooth ad hoc network for indoor positioning , 2005, IEE Proc. Softw..
[31] Hector Garcia-Molina,et al. Parallel crawlers , 2002, WWW.
[32] S. Iyer,et al. Mitigating the reader collision problem in RFID networks with mobile readers , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[33] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[34] JaatunMartin Gilje,et al. Agile Software Development , 2002, Comput. Sci. Educ..
[35] A. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.
[36] Daniel W. Engels,et al. HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).
[37] Roy Rada,et al. Ranking documents with a thesaurus , 1989, JASIS.
[38] Kang G. Shin,et al. Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs , 2002, IEEE Trans. Mob. Comput..
[39] Sunghyun Choi,et al. Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[40] Ygal Bendavid,et al. Proof of concept of an RFID-enabled supply chain in a B2B e-commerce environment , 2006, ICEC '06.
[41] Jianbin Hu,et al. Enhancing Base Station Security Against DoS Attacks in Wireless Sensor Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[42] Doo Seop Eom,et al. DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers , 2006, EUC Workshops.
[43] Philip Resnik,et al. Using Information Content to Evaluate Semantic Similarity in a Taxonomy , 1995, IJCAI.
[44] Francoise Pelle. ISSN , 2002 .
[45] Graeme Hirst,et al. Lexical chains as representations of context for the detection and correction of malapropisms , 1995 .
[46] Kenneth R. Beesley,et al. Arabic Morphology Using Only Finite-State Operations , 1998, SEMITIC@COLING.
[47] Roy Rada,et al. Development and application of a metric on semantic nets , 1989, IEEE Trans. Syst. Man Cybern..
[48] Jun-Seok Park,et al. Effects of reader interference on the RFID interrogation range , 2007, 2007 European Microwave Conference.
[49] Wonjun Lee,et al. GENTLE: Reducing Reader Collision in Mobile RFID Networks , 2008, 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks.
[50] Ivan Martinovic. Security in wireless networks , 2005 .
[51] Partha Dasgupta,et al. Security in wireless networks , 2005 .
[52] Minho Jo,et al. RFID tag detection on a water object using a backpropagation learning machine , 2007, KSII Trans. Internet Inf. Syst..
[53] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[54] John B. Goodenough,et al. Contextual correlates of synonymy , 1965, CACM.
[55] Choong Seon Hong,et al. Defense against lap-top class attacker in wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[56] John A. Goldsmith,et al. Unsupervised Learning of the Morphology of a Natural Language , 2001, CL.
[57] Michael Sussna,et al. Word sense disambiguation for free-text indexing using a massive semantic network , 1993, CIKM '93.
[58] Haitao Wu,et al. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[59] Alexander Budanitsky,et al. Lexical Semantic Relatedness and Its Application in Natural Language Processing , 1999 .
[60] Martin Chodorow,et al. Combining local context and wordnet similarity for word sense identification , 1998 .
[61] Manoj Sharma,et al. A Survey of RFID Tags , 2009 .
[62] Joachim Hammer,et al. Using mobile crawlers to search the Web efficiently , 2000, ACIS Int. J. Comput. Inf. Sci..
[63] Sebastiano Vigna,et al. UbiCrawler: a scalable fully distributed Web crawler , 2004, Softw. Pract. Exp..
[64] Dekang Lin,et al. Using Syntactic Dependency as Local Context to Resolve Word Sense Ambiguity , 1997, ACL.
[65] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[66] J. P. Gupta,et al. PARCAHYD: An Architecture of a Parallel Crawler based on Augmented Hypertext Documents , 2010 .
[67] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[68] Mani B. Srivastava,et al. Adaptive frame length control for improving wireless link throughput, range, and energy efficiency , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[69] Daniel W. Engels,et al. The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.
[70] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[71] K. Mohamedpour,et al. Securing wireless sensor networks against broadcast attacks , 2008, 2008 International Symposium on Telecommunications.