Search Results - "Lazos, L"

Refine Results
  1. 1

    HiRLoc: high-resolution robust localization for wireless sensor networks by Lazos, L., Poovendran, R.

    “…In this paper, we address the problem of robustly estimating the position of randomly deployed nodes of a wireless sensor network (WSN), in the presence of…”
    Get full text
    Journal Article
  2. 2

    Packet-Hiding Methods for Preventing Selective Jamming Attacks by Proano, A., Lazos, L.

    “…The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional…”
    Get full text
    Journal Article
  3. 3

    Energy and Bandwidth-Efficient Key Distribution in Wireless Ad Hoc Networks: A Cross-Layer Approach by Salido, J., Lazos, L., Poovendran, R.

    Published in IEEE/ACM transactions on networking (01-12-2007)
    “…We address the problem of resource-efficient access control for group communications in wireless ad hoc networks. Restricting the access to group data can be…”
    Get full text
    Journal Article
  4. 4

    Co-existence of os acromiale with suprascapular osseous bridge: a case report and review of the literature by Paraskevas, G, Raikos, A, Lazos, L, Economou, Z, Natsis, K

    Published in Folia morphologica (01-05-2009)
    “…We report on a very rare case of co-existence of os acromiale with suprascapular osseous bridge in a dry scapula. The frequency of os acromiale alone ranges…”
    Get full text
    Journal Article
  5. 5

    ROPE: robust position estimation in wireless sensor networks by Lazos, L., Radha Poovendran, Capkun, S.

    “…We address the problem of secure location determination, known as secure localization, and the problem of verifying the location claim of a node, known as…”
    Get full text
    Conference Proceeding
  6. 6

    Vulnerabilities of cognitive radio MAC protocols and countermeasures by Yan Zhang, Lazos, L.

    Published in IEEE network (01-05-2013)
    “…Cognitive Radio (CR) is a promising technology for opportunistically accessing underutilized licensed spectrum to achieve higher spectrum efficiency and…”
    Get full text
    Journal Article
  7. 7

    Selective jamming/dropping insider attacks in wireless mesh networks by Lazos, L, Krunz, M

    Published in IEEE network (01-01-2011)
    “…Wireless mesh networks promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their…”
    Get full text
    Journal Article
  8. 8

    Selective Jamming Attacks in Wireless Networks by Proaño, A, Lazos, L

    “…We address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary selectively targets specific packets of "high"…”
    Get full text
    Conference Proceeding
  9. 9

    Time-Delayed Broadcasting for Defeating Inside Jammers by Sisi Liu, Lazos, Loukas, Krunz, Marwan

    “…We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which…”
    Get full text
    Journal Article
  10. 10

    Cross-layer design for energy-efficient secure multicast communications in ad hoc networks by Lazos, L., Poovendran, R.

    “…This paper considers the problem of secure multicast in an energy-constrained wireless environment. We present an analytical formulation of the energy…”
    Get full text
    Conference Proceeding
  11. 11

    Microanatomy of the vasa vasorum of the human thoracic aorta: a study utilizing a polyester resin casting technique by Tsikaras, D P, Natsis, K, Hytiroglou, P, Lazos, L, Gigis, P

    Published in Morphologie (01-03-1997)
    “…We have studied the vasa vasorum of the human thoracic aorta using a polyester resin casting technique, coupled with the tissue clearing method of Spalteholz…”
    Get more information
    Journal Article
  12. 12

    Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach by Lazos, L., Poovendran, R., Meadows, C., Syverson, P., Chang, L.W.

    “…We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising…”
    Get full text
    Conference Proceeding
  13. 13

    Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networks by Lazos, L., Sisi Liu, Krunz, M.

    “…We address the problem of dynamic assignment of coordination (control) channels in cognitive radio networks (CRNs) by exploiting time- and space-varying…”
    Get full text
    Conference Proceeding
  14. 14

    Energy-aware secure multicast communication in ad-hoc networks using geographic location information by Lazos, L., Poovendran, R.

    “…The problem of securing multicast communications in an energy-constrained ad-hoc network requires the efficient management of cryptographic quantities. We show…”
    Get full text
    Conference Proceeding
  15. 15

    The use of unsaturated polyester resin solutions in preparing casts of the renal vessels by Tsikaras, P D, Hytiroglou, P M, Lazos, L M

    Published in Bulletin de l'Association des anatomistes (01-03-1985)
    “…A technique to prepare casts of the renal vessels using unsaturated polyester resin solutions is described. The dimensions, morphology and relations of the…”
    Get more information
    Journal Article
  16. 16

    A Primary User authentication system for mobile cognitive radio networks by Chandrashekar, S, Lazos, L

    “…Cognitive radio networks (CRNs) exploit the idle portion of the licensed spectrum to establish network communications. Essential to the co-existence of this…”
    Get full text
    Conference Proceeding
  17. 17

    Hiding contextual information in WSNs by Proano, A., Lazos, L.

    “…We address the problem of preserving the confidentiality of contextual information in wireless sensor networks (WSNs). Such information includes the time and…”
    Get full text
    Conference Proceeding
  18. 18

    Coverage In Heterogeneous Sensor Networks by Lazos, L., Poovendran, R.

    “…In this paper we study the problem of coverage in heterogeneous planar sensor networks. Coverage as a performance metric, quantifies the quality of monitoring…”
    Get full text
    Conference Proceeding
  19. 19

    Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits by Kozma, W., Lazos, L.

    “…We address the problem of identifying misbehaving nodes that (selectively) drop packets, in order to degrade the network performance. Such nodes may agree to…”
    Get full text
    Conference Proceeding
  20. 20

    On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets by Lazos, L., Poovendran, R., Ritcey, J.A.

    “…Detecting targets moving inside a field of interest is one of the fundamental services of Wireless Sensor Networks. The network performance with respect to…”
    Get full text
    Conference Proceeding