WiSec

AcronymDefinition
WiSecWireless Network Security (Conference)
Copyright 1988-2018 AcronymFinder.com, All rights reserved.
References in periodicals archive ?
Cao, Towards event source unobservability with minimum network traffic in sensor networks, in: Proceedings of the first ACM Conference on Wireless Network Security (WiSec), pp.77-88, 2008
Li, "Body sensor network security: an identity-based cryptography approach," in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp.
Zhu, "PBMDS: a behavior-based malware detection system for cellphone devices," in Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec '10), pp.
Cao, "Towards event source unobservability with minimum network traffic in sensor networks," in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp.
Freudiger, "How talkative is your mobile device?: an experimental study of Wi-Fi probe requests," in Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15), pp.
Kotz, "On the reliability of wireless fingerprinting using clock skews," in Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec '10), pp.
Johnson, "Rushing attacks and defense in wireless Ad Hoc network routing protocols," in Proceedings of the 2003 ACM Workshop on Wireless Security (WiSec '03), pp.
Dey, "Securacy: an empirical investigation of android applications' network usage, privacy and security," in Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (WiSec '15), June 2015.
Dougherty IV, "An efficient integrity-preserving scheme for hierarchical sensor aggregation," in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp.