Follow
Xiangqian Chen
Title
Cited by
Cited by
Year
Sensor network security: a survey
X Chen, K Makki, K Yen, N Pissinou
Communications Surveys & Tutorials, IEEE 11 (2), 52-73, 2009
8152009
Node compromise modeling and its applications in sensor networks
X Chen, K Makki, K Yen, N Pissinou
Computers and Communications, 2007. ISCC 2007. 12th IEEE Symposium on, 575-582, 2007
312007
Attack distribution modeling and its applications in sensor network security
X Chen, K Makki, K Yen, N Pissinou
EURASIP Journal on Wireless Communications and Networking 2008, 32, 2008
152008
A Context-Awareness Algorithm Based on Data Cache for Mobile Computing
F Gui, C Liu, X Chen, D Wang
World Wireless Congress, San Francisco, 2004
92004
A proactive secure routing algorithm defense against node compromise in sensor networks
X Chen, K Makki, K Yen, N Pissinou, Z Liu
Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, 557-559, 2008
62008
A new network topology evolution generator based on traffic increase and distribution model
X Chen, K Makki, K Yen, N Pissinou
Networking, 2007. ICN'07. Sixth International Conference on, 56-56, 2007
62007
Modeling Attack Distribution in Sensor Networks
X Chen, K Makki, K Yen, N Pissinou
Networked Sensing Systems, 2007. INSS'07. Fourth International Conference on …, 2007
42007
Network Topology Evolution based on Traffic Distribution and Increase
X Chen, K Makki, K Yen, N Pissinou, Z Liu
IJCSNS 8 (10), 42, 2008
32008
Defense against node compromise in sensor network security
X Chen
22007
DEFENSE AGAINST NODE COMPROMISE IN SENSOR NETWORK SECURITY: NODE COMPROMISE MODELING IN SENSOR NETWORK SECURITY
X Chen
LAP Lambert Academic Publishing, 2009
12009
Towards Preventing Junk Emails for Heterogeneous Network
X Chen, K Makki, K Yen, N Pissinou
The system can't perform the operation now. Try again later.
Articles 1–11