• 7392 Citations
  • 40 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Chapter
2004

Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths

Xu, H., Du, W. & Chapin, S. J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Jonsson, E., Almgren, M. & Valdes, A. (eds.). Springer Verlag, p. 21-38 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3224).

Research output: Chapter in Book/Report/Conference proceedingChapter

2007

A beacon-less location discovery scheme for wireless sensor networks

Fang, L., Du, W. & Ning, P., 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer New York LLC, p. 33-55 23 p. (Advances in Information Security; vol. 30).

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Scopus citations

Secure and resilient localization in wireless sensor networks

Ning, P., Liu, D. & Du, W., Dec 1 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Poovendran, R., Roy, S. & Wang, C. (eds.). p. 161-184 24 p. (Advances in Information Security; vol. 30).

Research output: Chapter in Book/Report/Conference proceedingChapter