Journal
COMPUTER
Volume 35, Issue 10, Pages 54-+Publisher
IEEE COMPUTER SOC
DOI: 10.1109/MC.2002.1039518
Keywords
-
Ask authors/readers for more resources
Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial-of-service attacks.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available