Search Results

There are 11567 results for: content related to: Modeling tools for detecting DoS attacks in WSNs

  1. Minimal Obstructions for 1-Immersions and Hardness of 1-Planarity Testing

    Journal of Graph Theory

    Volume 72, Issue 1, January 2013, Pages: 30–71, Vladimir P. Korzhik and Bojan Mohar

    Version of Record online : 26 JUN 2012, DOI: 10.1002/jgt.21630

  2. Efficiently navigating a random Delaunay triangulation

    Random Structures & Algorithms

    Nicolas Broutin, Olivier Devillers and Ross Hemsley

    Version of Record online : 24 FEB 2016, DOI: 10.1002/rsa.20630

  3. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.375

  4. Optimizing robustness in geometric routing via embedding redundancy and regeneration

    Networks

    Volume 66, Issue 4, December 2015, Pages: 320–334, Rein Houthooft, Sahel Sahhaf, Wouter Tavernier, Filip De Turck, Didier Colle and Mario Pickavet

    Version of Record online : 25 AUG 2015, DOI: 10.1002/net.21630

  5. Chance-constrained multi-terminal network design problems

    Naval Research Logistics (NRL)

    Volume 62, Issue 4, June 2015, Pages: 321–334, Yongjia Song and Minjiao Zhang

    Version of Record online : 15 MAY 2015, DOI: 10.1002/nav.21630

  6. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  7. Robust stability analysis of stochastic neural networks with Markovian jumping parameters and probabilistic time-varying delays

    Complexity

    Volume 21, Issue 5, May/June 2016, Pages: 59–72, Chandrasekar Pradeep, Arunachalam Chandrasekar, Rangasamy Murugesu and Rajan Rakkiyappan

    Version of Record online : 14 NOV 2014, DOI: 10.1002/cplx.21630

  8. Derivative Pricing with Liquidity Risk: Theory and Evidence from the Credit Default Swap Market

    The Journal of Finance

    Volume 66, Issue 1, February 2011, Pages: 203–240, DION BONGAERTS, FRANK DE JONG and JOOST DRIESSEN

    Version of Record online : 6 JAN 2011, DOI: 10.1111/j.1540-6261.2010.01630.x

  9. Decision Making with Second-Order Imprecise Probabilities

    International Journal of Intelligent Systems

    Volume 29, Issue 2, February 2014, Pages: 137–160, Rafik Aliev, W. Pedrycz, L.M. Zeinalova and O.H. Huseynov

    Version of Record online : 25 NOV 2013, DOI: 10.1002/int.21630

  10. Market Imperfections, Investment Flexibility, and Default Spreads

    The Journal of Finance

    Volume 59, Issue 1, February 2004, Pages: 165–205, Sheridan Titman, Stathis Tompaidis and Sergey Tsyplakov

    Version of Record online : 27 NOV 2005, DOI: 10.1111/j.1540-6261.2004.00630.x

  11. A comprehensive fault-tolerant framework for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3247–3261, Mehdi Afsar

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1249

  12. Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems

    Transactions on Emerging Telecommunications Technologies

    Volume 24, Issue 3, April 2013, Pages: 342–351, Jun Suk Kim, Bum-Gon Choi, Sueng Jae Bae, Inshil Doh and Min Young Chung

    Version of Record online : 27 MAR 2013, DOI: 10.1002/ett.2630

  13. Extinction and decay estimates of solutions for a polytropic filtration equation with the nonlocal source and interior absorption

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 6, April 2013, Pages: 730–743, Pan Zheng and Chunlai Mu

    Version of Record online : 27 JUN 2012, DOI: 10.1002/mma.2630

  14. Dual-mode stub-loaded resonator and its applications to single- and dual-band bandpass filters

    Microwave and Optical Technology Letters

    Volume 58, Issue 3, March 2016, Pages: 623–626, Bo Zhang, Jianming Huang, Shaosheng Li and Yuanan Liu

    Version of Record online : 27 JAN 2016, DOI: 10.1002/mop.29630

  15. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  16. Efficient and secure chaotic S-Box for wireless sensor network

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 279–292, Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret and Mounir Samet

    Version of Record online : 28 FEB 2013, DOI: 10.1002/sec.728

  17. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  18. A Dynamic Theory of the Banking Firm

    The Journal of Finance

    Volume 38, Issue 1, March 1983, Pages: 127–140, MAUREEN O'HARA

    Version of Record online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1983.tb03630.x

  19. Optimizing resource and data security in shared sensor networks

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 149–165, Christophe Huygens, Nelson Matthys and Wouter Joosen

    Version of Record online : 14 JUN 2011, DOI: 10.1002/sec.342

  20. Convergence of the bipolar expansion for the coulomb potential

    International Journal of Quantum Chemistry

    Volume 114, Issue 16, August 15, 2014, Pages: 1073–1078, Harris J. Silverstone

    Version of Record online : 19 FEB 2014, DOI: 10.1002/qua.24630