Philosophy of Life

Paper Resources

NEC Research Index, CiteSeer
Bibliography for Ad Hoc Networks
Bibliography of Security and Crypto.
IEEE Digital Libary
ACM Digital Library

CFP List
CFP List 2
Citeseer Publication Venues

NetLibrary
CRC EngNetBase - Engineering Handbook

Summaries and References for Theories
Security Publications from NIST

CS_Conf_ranking

People - Wireless Network

Samir R. Das at Stony Brook
P R Kumar at UIUC

People - Wireless and Wireless Network Security

David Wagner at UC Berkeley
David Evans at U. of Virginia
Jean-Pierre Hubaux at EPFL
Adrian Perrig at CMU
Susanne Wetzel at Stevens
Ian F. Akyildiz at Georgia Tech
Ning Peng at NC State
Badri Nath at Rutgers
Arbaugh at UMN
Welsh at Harvard
Bharat K Bhargava at Purdue

Security Research Center

Center for Secure Informaion Systems at GMU
Computer Security at UCDavis
CyLab at CMU
Cerias at Purdue
Cybersecurity at Stony Brook
Cybersecurity at PSU
Cybersecurity at IU
Network Security at U. of Washington
U. of Wisconsin
Reliable Software Group at UCSB
Information Trust at UIUC
TRUST at UCB

CERT
CAIDA
SANS Incidents
Net Security
astalavista
HoneyPots
PacketStormSecurity
ISSA
NCSC at NIST
DHS National Cyber Security Division

Relevant Journal

IEEE Tran. on Networking
IEEE Tran. on Wireless Comm.
Wireless Networks
Mobile Computing and Communications Review
IEEE Tran. on Mobile Computing
ACM MC2R

ACM Trans. on Information and System Security (TISSEC)
ACM Trans. on Sensor Networks
Computer Networks - Elsevier
Communications of ACM
Ad Hoc Networks - Elsevier
Springer - Security in Ad-hoc and Sensor Networks
IEEE Tran. on Dependable and Secure Computing
Journal of Computer Security

ACM Transactions on Embedded Computing Systems
IEEE Tran. on Automatic Control
IEEE Tran. List

Elsevier Pattern Recognition
Society for Industrial and Applied Mathmetics
J. of American Statistics Association

Relevant Conference

IEEE Computer Society Conf.
Wireless and Mobile Network CFP
Networking CFP
Mobicom
MobiSys
MobiHoc
Sensys'04
Infocom
ICNP
ICDCS'05
Annual Computer Security Applications Conference(ACSAC)
IEEE SecureCom
DSN
ESORICS
IEEE Workshop on Information Assurance
IEEE SECON
IEEE DCOSS
IEEE CDC
IEEE PerCom
International Conference on Information Processing in Sensor Networks (IPSN)
DISCEX

SASN

Applied Cryptography and Network Security (ACNS) conference
ICST


International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (ACM MSWiM)

USENIX Security Symposium

ACM SIG KDD - Knowledge Discovery and Data mining


EWSN

Sensor Networks

Sensor Refs
WINS at UCLA
Project at OSU
TinyOS
moteiv
TinyDB at UCB
CENS at UCLA

Secure - WSNs
Sensor NetBib

Sensor Network Simulator
Sensor Network Simulator from UCLA

Optimization of Sensor/Ad Hoc in Arizona
Sensor Network Lab at LSU
Xbow blog
Sensor Network Museum
Sunshine project @VT

Firebug GPS MTS420
IEEE Sensors
Sensor Blogs


Workshop on Real-World Wireless Sensor Networks
ACM EuroSys

TinyOS Progamming

TOSSIM Topology Generators
TinyOS programming Tips


Worm

worm blog
ACM WORM

IDS

IDS resources
IDS test
IDS - Statistics
HoneyNet

Cryptography

CRYPTO

Crypto FAQ from RSA
Lecture Notes on Cryptography
CryptToolkit from NIST
Win2000 Authentication
Bruce Schneier
IBM CryptoCards
Cryptography FAQ

Skipjack
Cryptography And Coding Information

Interesting Articles

Reinforcement Learning
Genetic Programming/Genetic Algo.
Kalman Filter
Particle Filter
Monte Carlo
Bloom Filter
Simulated Annealing
Expectation Maximization
Neural Network FAQ
Statistical Datamining
BUGS
BayesiaLab - Security
MCMC and Gibbs Sampling
Mean Square Error
Moore's best ideas
P value
Trimble's GPS

Classes

Bayes/Statistics at Rutgus
Applied Time Series Analysis

Math

Math World
SOS Math

Matrix Concept
Probability Distribution
MIT Mathematical Methods for Engineers I

Theoretical Computer Science Cheat Sheet(Local Copy)


Pattern

Pattern Recognition & machine learning
Pattern Recognition

Matlab

Matlab Tutorial
Matlab Figures
Matlab Statistical Toolbox
Engineering Data Analysis at UCB
ksdensity toobox

Search

FOLDC
wikipedia
MathWorld
Answers

Research Agency

DHS
AFOSR
DARPA
NSF Award Search

NSF ITR

Reading

Sensor Mag.
IEEE Security&Privacy Mag.
Information Security
Infoworld
Information Week
Security Focus
Security in Computer World
SC Magazine
CERT Current
Ausralia CERT
IFIP WG10.4 ON DEPENDABLE COMPUTING AND FAULT TOLERANCE
IFIP Working Group 11.3 on Data and Application Security
http://www-users.cs.umn.edu/~kumar/papers/papers.html

Bluetooth
Honeypots
LEGO RCX

Cellular Telephone Fraud
Cellular Telephone Fraud

A Must Read for All Ph.D.
Reality Mining at MIT
LEADING CYBER SECURITY EXPERTS IDENTIFY KEY RESEARCH CHALLENGES
Wile fire prevention using sensors

technologyreview
Science Daily

Wireless Communications

U.S. Frequency Allocations - The radio Spectrum
Fourier Series Synthesis
Math ad Physics Analysis
Antennas


Security

Secure Programming
Another Secure Programming

Virus Encyclopedia

IEEE Cipher
IEEE S&P Magazine


Exploiting Format String Vulnerabilities

Syngress Publishing

Zero Knowledge

Coding Help

pthread tutorial 1
pthread tutorial 1
MS Office Macro VBA tutorial


Radio Propagation Model
NS2 Debugging Tips

Latex

Tex Users Group
How to use BibTex

Tools

Free Online Virus Check
Online Dictionary

WSN App.

MoteLab at Harvard
Agriculture Sensor App.
Hamamatsu Photonics
Sensirion
WiEye
EasySen
aginova
decagon
WaterMark Sensor - Soil Moisture

Pelican - Enclosure
hammond - Enclosure
OKW - Enclosure

Antenna
Antenna
Antenna
Battery
Example System

Data Sets

JISAO at U. of Washington
"50" km resolution daily precipitation for the Pacific Northwest, 1949-94
National Center for Atmospheric Research

labdata at berkeley
S-Pol Radar Data

Dictionary

Dictionary