123
Voted
CNSR
15 years 7 months ago
2008 IEEE
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
116
click to vote
CNSR
15 years 7 months ago
2008 IEEE
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
97
Voted
CNSR
15 years 7 months ago
2008 IEEE
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
121
Voted
CNSR
15 years 7 months ago
2008 IEEE
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
93
Voted
CNSR
15 years 7 months ago
2008 IEEE
— Wireless sensor networks (WSNs) can be used to record and store audio data at remote and inaccessible places. However, audio data adds an additional concern to the design of th...
|