refs[] |
{'index': 0, 'target_release_id': None, 'extra': {'authors': ['R Maxion', 'T Townsend']}, 'key': 'b0', 'year': 2002, 'container_name': None, 'title': 'Masquerade detection using truncated command lines', 'locator': None}
{'index': 1, 'target_release_id': None, 'extra': {'authors': ['Boleslaw Szymanski', 'Yongqiang Zhang']}, 'key': 'b1', 'year': 2004, 'container_name': None, 'title': 'Recursive Data Mining for Masquerade Detection and Author Identification', 'locator': None}
{'index': 2, 'target_release_id': None, 'extra': {'authors': ['Phillip Porras', 'Richard Kemmerer']}, 'key': 'b2', 'year': 1992, 'container_name': None, 'title': 'Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach', 'locator': None}
{'index': 3, 'target_release_id': None, 'extra': {'authors': ['Sandeep Kumar', 'Eugene Spafford']}, 'key': 'b3', 'year': 1994, 'container_name': None, 'title': 'A Pattern Matching Model for Misuse Intrusion Detection', 'locator': None}
{'index': 4, 'target_release_id': None, 'extra': {'authors': ['Giovanni Vigna', 'Richard Kemmerer']}, 'key': 'b4', 'year': 1998, 'container_name': None, 'title': 'NetSTAT: A NetworkBased Intrusion Detection Approach', 'locator': None}
{'index': 5, 'target_release_id': None, 'extra': None, 'key': 'b5', 'year': 1998, 'container_name': None, 'title': 'Annual Computer Security Applications Conference (ACSAC)', 'locator': None}
{'index': 6, 'target_release_id': None, 'extra': {'authors': ['C Ko', 'M Ruschitzka', 'K Levitt']}, 'key': 'b6', 'year': 1997, 'container_name': None, 'title': 'Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specificationbased Approach', 'locator': None}
{'index': 7, 'target_release_id': None, 'extra': {'authors': ['A Ghosh', 'J Wanken', 'F Charron']}, 'key': 'b7', 'year': 1998, 'container_name': None, 'title': 'Detecting Anomalous and Unknown Intrusions Against Programs', 'locator': None}
{'index': 8, 'target_release_id': None, 'extra': {'authors': ['David Endler']}, 'key': 'b8', 'year': 1998, 'container_name': None, 'title': 'Intrusion Detection Applying Machine Learning to Solaris Audit Data', 'locator': None}
{'index': 9, 'target_release_id': None, 'extra': {'authors': ['I Akyildiz', 'W Su', 'Y Sankarasubramaniam', 'E Cayirci'], 'volume': '38'}, 'key': 'b9', 'year': 2002, 'container_name': None, 'title': 'Wireless Sensor Networks: A Survey', 'locator': None}
{'index': 10, 'target_release_id': None, 'extra': {'authors': ['J Yick', 'B Mukherjee', 'D Ghosal'], 'issue': '12', 'volume': '52'}, 'key': 'b10', 'year': 2008, 'container_name': None, 'title': 'Wireless sensor network survey', 'locator': None}
{'index': 11, 'target_release_id': None, 'extra': {'authors': ['M Tubaishat', 'S Madria'], 'issue': None, 'volume': '22'}, 'key': 'b11', 'year': 2003, 'container_name': None, 'title': 'Sensor Networks: An Overview', 'locator': None}
{'index': 12, 'target_release_id': None, 'extra': {'authors': ['J Walters', 'Z Liang', 'W Shi', 'V Chaudhary'], 'volume': '17'}, 'key': 'b12', 'year': 2007, 'container_name': None, 'title': 'Wireless Sensor Network Security: A Survey', 'locator': None}
{'index': 13, 'target_release_id': None, 'extra': {'authors': ['C Karlof', 'D Wagner']}, 'key': 'b13', 'year': 2002, 'container_name': None, 'title': 'Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures', 'locator': None}
{'index': 14, 'target_release_id': None, 'extra': {'authors': ['X Chen', 'K Makki', 'K Yen', 'N Pissinou'], 'issue': None, 'volume': '11'}, 'key': 'b14', 'year': 2009, 'container_name': None, 'title': 'Sensor network security: A Survey', 'locator': None}
{'index': 15, 'target_release_id': None, 'extra': {'authors': ['D Boyle', 'T Newe']}, 'key': 'b15', 'year': 2007, 'container_name': None, 'title': 'Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures', 'locator': None}
{'index': 16, 'target_release_id': None, 'extra': {'authors': ['H Alwan', 'A Agarwal']}, 'key': 'b16', 'year': 2009, 'container_name': None, 'title': 'A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks', 'locator': None}
{'index': 17, 'target_release_id': None, 'extra': {'authors': ['Y Wang', 'G Attebury', 'B Ramamurthy'], 'volume': None}, 'key': 'b17', 'year': 2006, 'container_name': None, 'title': 'A Survey of Security Issues in Wireless Sensor Networks', 'locator': None}
{'index': 18, 'target_release_id': None, 'extra': {'authors': ['D Mpitziopoulos', 'C Gavalas', 'G Konstantopoulos', 'Pantziou'], 'issue': None, 'volume': '11'}, 'key': 'b18', 'year': 2009, 'container_name': None, 'title': 'A Survey on Jamming Attacks and Countermeasures in WSNs', 'locator': None}
{'index': 19, 'target_release_id': None, 'extra': {'authors': ['R Schmid1', 'Wattenhofer']}, 'key': 'b19', 'year': 2006, 'container_name': None, 'title': 'Algorithmic Models for Sensor Networks', 'locator': None}
{'index': 20, 'target_release_id': None, 'extra': {'authors': ['P Von Rickenbach', 'R Wattenhofer', 'A Zollinger'], 'volume': '17'}, 'key': 'b20', 'year': 2009, 'container_name': None, 'title': 'Algorithmic Models of Interference in Wireless Ad Hoc and Sensor Networks', 'locator': None}
{'index': 21, 'target_release_id': None, 'extra': {'authors': ['S Dolev', 'S Gilbert', 'R Guerraoui', 'C Newport', 'F Kuhn', 'N Lynch', 'D Kowalski']}, 'key': 'b21', 'year': 2009, 'container_name': None, 'title': 'Reliable Distributed Computing on Unreliable Radio Channels (Extended Abstract)', 'locator': None}
{'index': 22, 'target_release_id': None, 'extra': None, 'key': 'b22', 'year': 2009, 'container_name': None, 'title': 'MobiHoc S3 Workshop on MobiHoc S3', 'locator': None}
{'index': 23, 'target_release_id': None, 'extra': {'authors': ['B Raman', 'K Chebrolu'], 'volume': '38'}, 'key': 'b23', 'year': 2008, 'container_name': None, 'title': 'Sensor Networks" from a Systems Perspective', 'locator': None}
{'index': 24, 'target_release_id': None, 'extra': {'authors': ['G Chockler', 'M Demirbas', 'S Gilbert', 'N Lynch', 'C Newport', 'T Nolte']}, 'key': 'b24', 'year': 2005, 'container_name': None, 'title': 'Reconciling the Theory and Practice of Unreliable Wireless Broadcast', 'locator': None}
{'index': 25, 'target_release_id': None, 'extra': {'authors': ['G Anastasi', 'A Falchi', 'A Passarella', 'M Conti', 'E Gregori']}, 'key': 'b25', 'year': 2004, 'container_name': None, 'title': 'Performance Measurements of Motes Sensor Networks', 'locator': None}
{'index': 26, 'target_release_id': None, 'extra': {'authors': ['J Polastre', 'R Szewczyk', 'D Culler']}, 'key': 'b26', 'year': 2005, 'container_name': None, 'title': 'Telos: Enabling UltraLow Power Wireless Research', 'locator': None}
{'index': 27, 'target_release_id': None, 'extra': {'authors': ['B Cody-Kenny', 'D Guerin', 'D Ennis', 'R Carbajo', 'M Huggard', 'C Goldrick']}, 'key': 'b27', 'year': 2009, 'container_name': None, 'title': 'Performance Evaluation of the 6LoWPAN Protocol on MICAz and TelosB Motes', 'locator': None}
{'index': 28, 'target_release_id': None, 'extra': {'authors': ['W Heinzelman', 'A Chandrakasan', 'H Balakrishnan']}, 'key': 'b28', 'year': 2000, 'container_name': None, 'title': 'Energy-Efficient Communication Protocol for Wireless Microsensor Networks', 'locator': None}
{'index': 29, 'target_release_id': None, 'extra': {'authors': ['S Kumar', 'V Raghavan', 'J Deng'], 'volume': None}, 'key': 'b29', 'year': 2006, 'container_name': None, 'title': 'Medium Access Control Protocols for Ad Hoc Wireless Networks: A Survey', 'locator': None}
{'index': 30, 'target_release_id': None, 'extra': {'authors': ['Y Li', 'W Ye', 'J Heidemann']}, 'key': 'b30', 'year': 2005, 'container_name': None, 'title': 'Energy and Latency Control in Low Duty Cycle MAC Protocols', 'locator': None}
{'index': 31, 'target_release_id': None, 'extra': {'authors': ['K Whitehouse', 'A Woo', 'F Jiang', 'J Polastre', 'D Culler']}, 'key': 'b31', 'year': 2005, 'container_name': None, 'title': 'Exploitingthe Capture Effect for Collision Detection and Recovery', 'locator': None}
{'index': 32, 'target_release_id': None, 'extra': {'authors': ['C Raman', 'Atul Negi']}, 'key': 'b32', 'year': 2005, 'container_name': None, 'title': 'A hybrid method to intrusion detection system using HMM', 'locator': None}
{'index': 33, 'target_release_id': None, 'extra': {'authors': ['I Brain C Davell Richard', 'A Davis', 'Terry Caelli']}, 'key': 'b33', 'year': None, 'container_name': None, 'title': 'Improved estimation of hidden Markov model parameters from mutiple observation sequences', 'locator': None}
|