咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是261-270 订阅
排序:
On multiple point coverage in wireless sensor networks
On multiple point coverage in wireless sensor networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Yang, Shuhui Dai, Fei Cardei, Mihaela Wu, Jie Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL 33431 Department of Electrical and Computer Engineering North Dakota State University Fargo ND 58105
We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is... 详细信息
来源: 评论
Reputed Authenticated Routing for Ad hoc networks protocol (Reputed-ARAN)
Reputed Authenticated Routing for Ad hoc Networks protocol (...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Mahmoud, Abdalla Sameh, Ahmed El-Kassas, Sherif Department of Computer Science University in Cairo Egypt P.O. Box 2511 Cairo Egypt
In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is base... 详细信息
来源: 评论
Reactive ID assignment for sensor networks
Reactive ID assignment for sensor networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Zhou, Hongbo Mutka, Matt W. Ni, Lionel M. Dept. of Computer Science Slippery Rock University Slippery Rock United States Dept. of Computer Science and Engineering Michigan State University East Lansing United States Dept. of Computer Science Hong Kong University of Science and Technology Hong Kong Hong Kong
Globally unique ID allocation is usually not applicable in a sensor network due to the massive production of cheap sensor nodes, the limited bandwidth, and the size of the payload. However, locally unique IDs are stil... 详细信息
来源: 评论
Enforcing security for prevention of DoS attack in wireless sensor networks using economical modeling
Enforcing security for prevention of DoS attack in wireless ...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Agah, Afrand Basu, Kalyan Das, Sajal K. Department of Computer Science and Engineering University of Texas at Arlington Arlington TX 76019-0015
This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the require... 详细信息
来源: 评论
Maintaining functional module integrity in sensor networks
Maintaining functional module integrity in sensor networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Pongaliur, Kanthakumar Wang, Chen Xiao, Li Department of Computer Science and Engineering Michigan State University East Lansing MI 48823
security is one of the top concerns when sensorsare deployed in hostile environments for military applications. Attacks on sensor nodes can be categorized into two types: attacks through radio signals to alter the fun... 详细信息
来源: 评论
Reliable and semi-reliable communication with authentication in mobile ad hoc networks
Reliable and semi-reliable communication with authentication...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Dressler, Falko Autonomic Networking Group Dept. of Computer Sciences University of Erlangen Martensstr. 3 91058 Erlangen Germany
A typical characteristic of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication paths. The search for reliable communication methodologies in this area in combinat... 详细信息
来源: 评论
Framework for statistical filtering against DDoS attacks in MANETs
Framework for statistical filtering against DDoS attacks in ...
收藏 引用
ICESS 2005 - 2nd international conference on Embedded Software and systems
作者: Tan, Hwee-Xian Seah, Winston K. G. Department of Computer Science School of Computing National University of Singapore A STAR Singapore Singapore
A DDoS (distributed Denial-Of-Service) attack is a distributed, large-scale attempt by malicious users to flood the victim network with an enormous number of packets. This exhausts the victim network of resources such... 详细信息
来源: 评论
New Non-Interactive Key Agreement and Progression (NIKAP) protocols and their applications to security in ad hoc networks
New Non-Interactive Key Agreement and Progression (NIKAP) pr...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Li, Zhenjiang Garcia-Luna-Aceves, J.J. Department of Computer Engineering University of California Santa Cruz 1156 high street Santa Cruz CA 95064 United States 3333 Coyote Hill Road Palo Alto CA 94304
Symmetric cryptographic primitives are preferable in designing security protocols for mobile ad hoc networks (MANETs) because they are computationally affordable for resource-constrained mobile devices forming a MANET... 详细信息
来源: 评论
Active collaborations for trustworthy data management in ad hoc networks
Active collaborations for trustworthy data management in ad ...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Patwardhan, Anand Perich, Filip Joshi, Anupam Finin, Tim Yesha, Yelena Department of Computer Science and Electrical Engineering UMBC Baltimore MD 21250
We propose a trust-based data management framework for enabling individual devices to harness the potential power of distributed computation, storage, and sensory resources available in pervasive computing environment... 详细信息
来源: 评论
Attack-resilient time synchronization for wireless sensor networks
Attack-resilient time synchronization for wireless sensor ne...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Song, Hui Zhu, Sencun Cao, Guohong Department of Computer Science and Engineering Pennsylvania State University University Park PA 16802
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effecti... 详细信息
来源: 评论