Keyphrases
Sensor Networks
100%
Worm
100%
Worm Attack
100%
Diversity Approaches
100%
Software Diversity
100%
Buffer Overflow Attack
28%
Malicious Code
14%
Sensor Node
14%
Attacker
14%
System Parameters
14%
Survivability
14%
Cost Constraint
14%
Parameter Dependence
14%
Operating System
14%
Internet Worm
14%
Percolation Theory
14%
Software Version
14%
Deployment Errors
14%
Mote
14%
Single Packet
14%
Mica2
14%
Resource Constraints
14%
Program Safety
14%
Worm Propagation
14%
Sensor Node Deployment
14%
Hardware Architecture
14%
Real Experiment
14%
Computer Science
Sensor Networks
100%
Software Diversity
100%
Sensor Node
66%
Buffer Overflow
66%
Malicious Code
33%
Operating Systems
33%
Attackers
33%
System Parameter
33%
Efficient Algorithm
33%
Hardware Architecture
33%
Resource Constraint
33%
Percolation Theory
33%
Worm Propagation
33%
Engineering
Sensor Network
100%
Sensor Node
66%
Simulation Result
33%
Illustrates
33%
Survivability
33%
System Parameter
33%
Analytical Result
33%
Safety Program
33%
Percolation Theory
33%
Limited Number
33%
Real Experiment
33%