Philosophy of Life
Paper Resources
NEC Research Index, CiteSeer
Bibliography for Ad Hoc Networks
Bibliography of Security and Crypto.
IEEE Digital Libary
ACM Digital Library
CFP List
CFP List 2
Citeseer Publication Venues
NetLibrary
CRC EngNetBase - Engineering Handbook
Summaries and References for Theories
Security Publications from NIST
CS_Conf_ranking
People - Wireless Network
Samir R. Das at Stony Brook
P R Kumar at UIUC
People - Wireless and Wireless Network Security
David Wagner at UC Berkeley
David Evans at U. of Virginia
Jean-Pierre Hubaux at EPFL
Adrian Perrig at CMU
Susanne Wetzel at Stevens
Ian F. Akyildiz at Georgia Tech
Ning Peng at NC State
Badri Nath at Rutgers
Arbaugh at UMN
Welsh at Harvard
Bharat K Bhargava at Purdue
Security Research Center
Center for Secure Informaion Systems at GMU
Computer Security at UCDavis
CyLab at CMU
Cerias at Purdue
Cybersecurity at Stony Brook
Cybersecurity at PSU
Cybersecurity at IU
Network Security at U. of Washington
U. of Wisconsin
Reliable Software Group at UCSB
Information Trust at UIUC
TRUST at UCB
CERT
CAIDA
SANS Incidents
Net Security
astalavista
HoneyPots
PacketStormSecurity
ISSA
NCSC at NIST
DHS National Cyber Security Division
Relevant Journal
IEEE Tran. on Networking
IEEE Tran. on Wireless Comm.
Wireless Networks
Mobile Computing and Communications Review
IEEE Tran. on Mobile Computing
ACM MC2R
ACM Trans. on Information and System Security (TISSEC)
ACM Trans. on Sensor Networks
Computer Networks - Elsevier
Communications of ACM
Ad Hoc Networks - Elsevier
Springer - Security in Ad-hoc and Sensor Networks
IEEE Tran. on Dependable and Secure Computing
Journal of Computer Security
ACM Transactions on Embedded Computing Systems
IEEE Tran. on Automatic Control
IEEE Tran. List
Elsevier Pattern Recognition
Society for Industrial and Applied Mathmetics
J. of American Statistics Association
Relevant Conference
IEEE Computer Society Conf.
Wireless and Mobile Network CFP
Networking CFP
Mobicom
MobiSys
MobiHoc
Sensys'04
Infocom
ICNP
ICDCS'05
Annual Computer Security Applications Conference(ACSAC)
IEEE SecureCom
DSN
ESORICS
IEEE Workshop on Information Assurance
IEEE SECON
IEEE DCOSS
IEEE CDC
IEEE PerCom
International Conference on Information Processing in Sensor Networks (IPSN)
DISCEX
SASN
Applied Cryptography and Network Security (ACNS) conference
ICST
International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (ACM MSWiM)
USENIX Security Symposium
ACM SIG KDD - Knowledge Discovery and Data mining
EWSN
Sensor Networks
Sensor Refs
WINS at UCLA
Project at OSU
TinyOS
moteiv
TinyDB at UCB
CENS at UCLA
Secure - WSNs
Sensor NetBib
Sensor Network Simulator
Sensor Network Simulator from UCLA
Optimization of Sensor/Ad Hoc in Arizona
Sensor Network Lab at LSU
Xbow blog
Sensor Network Museum
Sunshine project @VT
Firebug GPS MTS420
IEEE Sensors
Sensor Blogs
Workshop on Real-World Wireless Sensor Networks
ACM EuroSys
TinyOS Progamming
TOSSIM Topology Generators
TinyOS programming Tips
Worm
worm blog
ACM WORM
IDS
IDS resources
IDS test
IDS - Statistics
HoneyNet
Cryptography
CRYPTO
Crypto FAQ from RSA
Lecture Notes on Cryptography
CryptToolkit from NIST
Win2000 Authentication
Bruce Schneier
IBM CryptoCards
Cryptography FAQ
Skipjack
Cryptography And Coding Information
Interesting Articles
Reinforcement Learning
Genetic Programming/Genetic Algo.
Kalman Filter
Particle Filter
Monte Carlo
Bloom Filter
Simulated Annealing
Expectation Maximization
Neural Network FAQ
Statistical Datamining
BUGS
BayesiaLab - Security
MCMC and Gibbs Sampling
Mean Square Error
Moore's best ideas
P value
Trimble's GPS
Classes
Bayes/Statistics at Rutgus
Applied Time Series Analysis
Math
Math World
SOS Math
Matrix Concept
Probability Distribution
MIT Mathematical Methods for Engineers I
Theoretical Computer Science Cheat Sheet(Local Copy)
Pattern
Pattern Recognition & machine learning
Pattern Recognition
Matlab
Matlab Tutorial
Matlab Figures
Matlab Statistical Toolbox
Engineering Data Analysis at UCB
ksdensity toobox
Search
FOLDC
wikipedia
MathWorld
Answers
Research Agency
DHS
AFOSR
DARPA
NSF Award Search
NSF ITR
Reading
Sensor Mag.
IEEE Security&Privacy Mag.
Information Security
Infoworld
Information Week
Security Focus
Security in Computer World
SC Magazine
CERT Current
Ausralia CERT
IFIP WG10.4 ON DEPENDABLE COMPUTING AND FAULT TOLERANCE
IFIP Working Group 11.3 on Data and Application Security
http://www-users.cs.umn.edu/~kumar/papers/papers.html
Bluetooth
Honeypots
LEGO RCX
Cellular Telephone Fraud
Cellular Telephone Fraud
A Must Read for All Ph.D.
Reality Mining at MIT
LEADING CYBER SECURITY EXPERTS IDENTIFY KEY RESEARCH CHALLENGES
Wile fire prevention using sensors
technologyreview
Science Daily
Wireless Communications
U.S. Frequency Allocations - The radio Spectrum
Fourier Series Synthesis
Math ad Physics Analysis
Antennas
Security
Secure Programming
Another Secure Programming
Virus Encyclopedia
IEEE Cipher
IEEE S&P Magazine
Exploiting Format String Vulnerabilities
Syngress Publishing
Zero Knowledge
Coding Help
pthread tutorial 1
pthread tutorial 1
MS Office Macro VBA tutorial
Radio Propagation Model
NS2 Debugging Tips
Latex
Tex Users Group
How to use BibTex
Tools
Free Online Virus Check
Online Dictionary
WSN App.
MoteLab at Harvard
Agriculture Sensor App.
Hamamatsu Photonics
Sensirion
WiEye
EasySen
aginova
decagon
WaterMark Sensor - Soil Moisture
Pelican - Enclosure
hammond - Enclosure
OKW - Enclosure
Antenna
Antenna
Antenna
Battery
Example System
Data Sets
JISAO at U. of Washington
"50" km resolution daily precipitation for the Pacific Northwest, 1949-94
National Center for Atmospheric Research
labdata at berkeley
S-Pol Radar Data
Dictionary