C. Karlof and D.Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures", Ad Hoc Networks ,2003 View Artical
T. Roosta, S. Pai, P. Chen, S. Sastry, and S. Wicker, "Inherent security of routing protocols in ad-hoc and sensor networks", In Global Telecommunications Conference, GLOBECOM ,2007 View Artical
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks", In Proceedings of the 6th ACM International Sympos ,2005 View Artical
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: attack and defense strategies", IEEE Network Magazine ,2006 View Artical
M. Stasiak, M. G?abowski, A. Wi?niewski, and P. Zwierzykowski, "Modeling and Dimensioning of Mobile Networks: From GSM to LTE ,2011 View Artical
G. Cena, L. Seno, A. Valenzano, and C. Zunino, "On the performance of IEEE 802.11e wireless infrastructures for soft-real-time industrial applicatio", IEEE Trans. Ind. Informat ,2010 View Artical
T. Cucinotta, L. Palopoli, L. Abeni, D. Faggioli, and G. Lipari, "On the integration of application level and resource level QoS control for real-time applications", IEEE Trans. Ind. Informat ,2010 View Artical
K. Leung, W. Massey, and W. Whitt, "Traffic models for wireless communication networks", IEEE J. Sel. Areas Commun., ,Vol.12 ,1994 View Artical
M. Gribaudo, C. Chiasserini, R. Gaeta, M. Garetto, D. Manini, and M. Sereno, "A spatial fluid-based framework to analyze large-scale wireless sensor networks", International Conference on Dependable Systems and ,2005 View Artical
S. Toumpis and L. Tassiulas, "Packetostatics: deployment of massively dense sensor networks as an electrostatics problem ,2005 View Artical
J. Silvester and L. Kleinrock, "On the capacity of multihop slotted ALOHA networks with regular structure", IEEE Trans. Commun., ,Vol.31 ,1983 View Artical
M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of random wireless networks", International Symposium on Information ,2004 View Artical
M. Bhardwaj, T. Garnett, and A. P. Chandrakasan, "Upper bounds on the lifetime of sensor networks", In Proc. IEEE Int. Conf. Communication ,2001 View Artical
H. Zhang and J. C. Hou, "On the upper bound of ??lifetime for large sensor networks", ACM Trans. Sens. Netw ,2005 View Artical
S. Olariu and I. Stojmenovic, "Design guidelines for maximizing lifetime and avoiding energy holes in sensor networks with uniform ", Proc. IEEE Int. Conf. Comput. Commun ,2006 View Artical
M. Bhardwaj and A. P. Chandrakasan, "Bounding the lifetime of sensor networks via optimal role assignments", in Proc. INFOCOM ,2002 View Artical
A. P. Azad and A. Chockalingam, "Wlc12-2: Bounds on the lifetime of wireless sensor networks employing multiple data sinks", in Proc. GLOBECOM ,2006 View Artical
D. M. Blough and P. Santi, "Investigating upper bounds on network lifetime extension for cell-based energy conservation techniqu", in Proc. MobiCom ,2002 View Artical
R. R. Rout and S. K. Ghosh, "Enhancement of lifetime using duty cycle and network coding in wireless sensor networks", IEEE Trans. Wireless Commun. ,Vol.12 ,2013 View Artical
M. Neugebauer and K. Kabitzsch, "A new protocol for a low power sensor network", in Proc. IEEE Int. Conf. Perform., Computer. Commu ,2004 View Artical
Mohammad SazzadulHoque, Md. Abdul Mukit2 and Md. Abu NaserBikas, "An Implementation Of Intrusion DetectionSystem Using Genetic Algorithm", International Journal of Network Security & Its Ap ,2012 View Artical
A. Chittur,, "Model Generation for an Intrusion Detection System Using Genetic Algorithms ,2005 View Artical
W. Li, "Using Genetic Algorithm for Network Intrusion Detection", A Genetic Algorithm Approach to Network Intrusion ,2004 View Artical
W. Lu, I. Traore, "Detecting New Forms of Network Intrusion Using Genetic Programming", Computational Intelligence ,2004 View Artical
M. M. Pillai, J. H. P. Eloff, H. S. Venter, "An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms", Proceedings of SAICSIT ,2004 View Artical
S. M. Bridges, R. B. Vaughn, "Fuzzy Data Mining And Genetic Algorithms Applied ToIntrusion Detection", Proceedings of 12th Annual Canadian Information Te ,2000 View Artical
J. Gomez, D. Dasgupta, "Evolving Fuzzy Classifiers for Intrusion Detection", Proceedingsof theIEEE ,2002 View Artical
M. Middlemiss, G. Dick, "Feature selection of intrusion detection data using a hybridgeneticalgorithm/KNN approach", Design and application of hybrid intelligent syste ,2003 View Artical
SrinivasMukkamala, Andrew H. Sung, Ajith Abraham, "Intrusion detection using anensembleof intelligent paradigms", Journal of Network and Computer Applications ,Vol.28 ,2005 View Artical
S. Peddabachigari, Ajith Abraham, C. Grosan, J. Thomas, "Modeling intrusion detectionsystemusing hybrid intelligent systems", Journal of Network and Computer Applications ,Vol.30 ,2007 View Artical
M. SanieeAbadeh, J. Habibi, C. Lucas, "Intrusion detection using a fuzzy genetics-basedlearning algorithm", Journal of Network and Computer Applications ,2007 View Artical
Tao Peng, C. Leckie, KotagiriRamamohanarao, "Information sharing for distributedintrusiondetection systems", Journal of Network and Computer Applications ,Vol.30 ,2007 View Artical