Author of the publication

A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks.

, and . Handbook of Sensor Networks, CRC Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-aware wireless sensor networks for assisted living and residential monitoring., , , , , , , , , and . IEEE Netw., 22 (4): 26-33 (2008)SenQ: An Embedded Query System for Streaming Data in Heterogeneous Interactive Wireless Sensor Networks., , and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 531-543. Springer, (2008)Realistic Applications for Wireless Sensor Networks., , and . Theoretical Aspects of Distributed Computing in Sensor Networks, Springer, (2011)Communication Architecture and Programming Abstractions for Real-Time Embedded Sensor Networks., , , , , , and . Handbook of Sensor Networks, CRC Press, (2004)LUSTER: wireless sensor network for environmental research., , , , , , , , , and 1 other author(s). SenSys, page 103-116. ACM, (2007)JAM: A Jammed-Area Mapping Service for Sensor Networks., , and . RTSS, page 286-297. IEEE Computer Society, (2003)AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks., and . SenSys, page 395-396. ACM, (2006)Human in the loop: distributed data streams for immersive cyber-physical systems., and . SIGBED Review, 5 (1): 20 (2008)Online Coding for Reliable Data Transfer in Lossy Wireless Sensor Networks., and . DCOSS, volume 5516 of Lecture Notes in Computer Science, page 159-172. Springer, (2009)Denial of Service in Sensor Networks., and . Computer, 35 (10): 54-62 (2002)