×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [wormhole attacks]
Home >
wormhole attacks
Securing Underwatre Wireless Communication Networks
279 views
Wireless Sensor Networks
2.750 views
Design and implementation of tarf trust aware routing framework for ws ns.bak
2.792 views
Design & imlementation of tarf
1.535 views
Design & imlementation of tarf
684 views
Grey Hole Document
16 views
On The Intruder Detection For Sinkhole Attack In Wireless Sensor Networks
2.155 views
On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks Edith C. H. Ngai 1, Jiangchuan Liu 2, and Michael R. Lyu 1 1 Department of Computer.
213 views
Modeling Ad-hoc Rushing Attack in a Negligiblity -based Security Framework Jiejun Kong Mario Gerla Jiejun Kong, * Xiaoyan Hong, # Mario Gerla Scalable.
217 views
1 Somya Kapoor Jorge Chang Amarnath Kolla. 2 Agenda Introduction and Architecture of WSN –Somya Kapoor Security threats on WSN – Jorge Chang & Amarnath.
227 views
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
218 views
Monte Carlo Techniques for Secure Localization ARO Workshop on Localization in Wireless Sensor Networks 14 June 2005 David.
227 views
Next >