Sensor network security: a survey X Chen, K Makki, K Yen, N Pissinou Communications Surveys & Tutorials, IEEE 11 (2), 52-73, 2009 | 815 | 2009 |
Node compromise modeling and its applications in sensor networks X Chen, K Makki, K Yen, N Pissinou Computers and Communications, 2007. ISCC 2007. 12th IEEE Symposium on, 575-582, 2007 | 31 | 2007 |
Attack distribution modeling and its applications in sensor network security X Chen, K Makki, K Yen, N Pissinou EURASIP Journal on Wireless Communications and Networking 2008, 32, 2008 | 16 | 2008 |
A Context-Awareness Algorithm Based on Data Cache for Mobile Computing F Gui, C Liu, X Chen, D Wang World Wireless Congress, San Francisco, 2004 | 9 | 2004 |
A proactive secure routing algorithm defense against node compromise in sensor networks X Chen, K Makki, K Yen, N Pissinou, Z Liu Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, 557-559, 2008 | 6 | 2008 |
A new network topology evolution generator based on traffic increase and distribution model X Chen, K Makki, K Yen, N Pissinou Networking, 2007. ICN'07. Sixth International Conference on, 56-56, 2007 | 6 | 2007 |
Modeling Attack Distribution in Sensor Networks X Chen, K Makki, K Yen, N Pissinou Networked Sensing Systems, 2007. INSS'07. Fourth International Conference on …, 2007 | 4 | 2007 |
Network Topology Evolution based on Traffic Distribution and Increase X Chen, K Makki, K Yen, N Pissinou, Z Liu IJCSNS 8 (10), 42, 2008 | 3 | 2008 |
Defense against node compromise in sensor network security X Chen | 2 | 2007 |
DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY: NODE COMPROMISE MODELING IN SENSOR NETWORK SECURITY X Chen LAP Lambert Academic Publishing, 2009 | 1 | 2009 |
Towards Preventing Junk Emails for Heterogeneous Network X Chen, K Makki, K Yen, N Pissinou | | |