Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,906,476 papers from all fields of science
Search
Sign In
Create Free Account
Watchdog timer
Known as:
Watchdog
, Watchdog Card
, Watch dog timer
Expand
A watchdog timer (sometimes called a computer operating properly or COP timer, or simply a watchdog) is an electronic timer that is used to detect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACARM-ng
Atmel AVR
Automatic system recovery
Blackfin
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Eaack- A Secure Intrusion Detection System for Manets
Dr. K. Selvakumar
,
G. Revathi
,
V. Murugan
2015
Corpus ID: 61491975
Article history: Received 12 October 2014 Received in revised form 26 December 2014 Accepted 1 January 2015 Available online 25…
Expand
2014
2014
False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN
A. Karuppiah
,
S. Rajaram
2014
Corpus ID: 56331946
A Wireless Sensor Network (WSN) consists of many sensor nodes with low cost and power capability. The nature of WSN makes it…
Expand
2014
2014
Effectiveness of Fault Detection Mechanisms in Static and Dynamic Operating System Designs
Martin Hoffmann
,
C. Borchert
,
+4 authors
Daniel Lohmann
IEEE International Symposium on Object/Component…
2014
Corpus ID: 7040334
Developers of embedded (real-time) systems can choose from a variety of operating systems. While some embedded operating systems…
Expand
2010
2010
An authentication scheme for locating compromised sensor nodes in WSNs
Youtao Zhang
,
Jun Yang
,
Weijia Li
,
Linzhang Wang
,
Lingling Jin
Journal of Network and Computer Applications
2010
Corpus ID: 33387
2009
2009
Toward a cross-layer monitoring process for mobile ad hoc networks
A. Rachedi
,
A. Benslimane
Secur. Commun. Networks
2009
Corpus ID: 12063048
The intrusion detection system (IDS) for mobile ad hoc networks (MANET) consists in monitoring the nodes' behavior, in order to…
Expand
Highly Cited
2009
Highly Cited
2009
On eliminating packet droppers in MANET: A modular solution
D. Djenouri
,
N. Badache
Ad hoc networks
2009
Corpus ID: 12271348
2006
2006
Public Law Values in a Privatized World
Laura A. Dickinson
2006
Corpus ID: 54660549
Although domestic administrative law scholars have long debated privatization within the US, this debate has not confronted the…
Expand
2006
2006
CFCET: A hardware-based control flow checking technique in COTS processors using execution tracing
Amir Rajabzadeh
,
S. Miremadi
Microelectronics and reliability
2006
Corpus ID: 32814065
2003
2003
Identifying flaws in the secure routing protocol
J. Marshall
,
Vikram Thakur
,
Alec Yasinsac
Conference Proceedings of the IEEE International…
2003
Corpus ID: 19531922
We analyze the secure routing protocol (SRP) introduced by P. Papadimitratos and Z.J. Haas (see SCS Communication Networks and…
Expand
2000
2000
The Grenade Timer: Fortifying the Watchdog Timer Against Malicious Mobile Code
F. Stajano
,
Ross J. Anderson
2000
Corpus ID: 6250651
Systems accepting mobile code need protection from denial of service attacks staged by the guest program. While protected mode is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE