• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19992020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2004

    Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths

    Xu, H., Du, W. & Chapin, S. J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jonsson, E., Almgren, M. & Valdes, A. (eds.). Springer Verlag, p. 21-38 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3224).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    13 Scopus citations
  • 2007

    A beacon-less location discovery scheme for wireless sensor networks

    Fang, L., Du, W. & Ning, P., 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer New York LLC, p. 33-55 23 p. (Advances in Information Security; vol. 30).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Secure and resilient localization in wireless sensor networks

    Ning, P., Liu, D. & Du, W., Dec 1 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Poovendran, R., Roy, S. & Wang, C. (eds.). p. 161-184 24 p. (Advances in Information Security; vol. 30).

    Research output: Chapter in Book/Report/Conference proceedingChapter