This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
News, V. (2013). NFL agrees to deal in concussion lawsuit. Lanham: Federal Information & News Dispatch, Inc. Retrieved from http://search.proquest.com/docview/1428838809?accountid=14584Search in Google Scholar
Lomberg, J. (2013, January 29). Sensor pad analyzes impacts in football helmets. Electronic Component News. Retrieved October 22, 2013, from http://www.ecnmag.com/articles/2013/01/sensor-pad-analyzes-impacts-football-helmetsSearch in Google Scholar
Sen, J. (2010). A survey on wireless sensor network security. arXiv preprint arXiv:1011.1529.Search in Google Scholar
Oh, S., Kumar, P.S., Kwon, H., Rai, P., Ramasamy, M., Varadan, V.K. (2013, April 9) Wireless health monitoring helmet for football players to diagnose concussion and track fatigue. Proc. SPIE 8691, Nanosensors, Biosensors, and Info-Tech Sensors and Systems, 869106 (April 9, 2013); doi:10.1117/12.2009719.10.1117/12.2009719Search in Google Scholar
Giannetsos, T., & Dimitriou, T. (2013, April). Spy-Sense: spyware tool for executing stealthy exploits against sensor networks. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy (pp. 7-12). ACM.10.1145/2463183.2463186Search in Google Scholar
Clark, S. S., Ransford, B., Rahmati, A., Guineau, S., Sorber, J., Fu, K., Xu, W. (2013) WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. Proceedings of USENIX Workshop on Health Information Technologies.Search in Google Scholar
Wang, Y. T., & Bagrodia, R. (2012, August). ComSen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks. In SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies (pp. 148-156).Search in Google Scholar
Hahnsang Kim, Joshua Smith, and Kang G. Shin. (2008). Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th international conference on Mobile systems, applications, and services (MobiSys ‘08). ACM, New York, NY, USA, 239-252. DOI=10.1145/1378600.1378627 http://doi.acm.org/10.1145/1378600.137862710.1145/1378600.1378627Search in Google Scholar
Fix, E., Hodges, J. L. (1951) Discriminatory analysis, nonparametric discrimination: Consistency properties US Air Force School of Aviation Medicine, Vol. Technical Report 4, No. 3.10.1037/e471672008-001Search in Google Scholar
Dudani, S. A. (1976). The distance-weighted k-nearest-neighbor rule. Systems, Man and Cybernetics, IEEE Transactions on, (4), 325-327.10.1109/TSMC.1976.5408784Search in Google Scholar
Engels, D., Fan, X., Gong, G., Hu, H., & Smith, E. M. (2010). Hummingbird: ultralightweight cryptography for resource-constrained devices. In Financial Cryptography and Data Security (pp. 3-18). Springer Berlin Heidelberg.10.1007/978-3-642-14992-4_2Search in Google Scholar
A. Bogdanov et al. (2007). PRESENT: An Ultra-Lightweight Block Cipher. Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES 07), LNCS 4727, Springer, pp. 450-466.10.1007/978-3-540-74735-2_31Search in Google Scholar
Hu, L., & Evans, D. (2004, February). Using Directional Antennas to Prevent Wormhole Attacks. In NDSS.Search in Google Scholar
Banerjee, S., & Majumder, K. (2012). A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 372-384). Springer Berlin Heidelberg.10.1007/978-3-642-34135-9_37Search in Google Scholar
Wood, A.D., & Stankovic, J.A. (2002). Denial of Service in Sensor Networks. IEEE Computer,Vol. 35, No. 10, pp. 54-62, 2002.10.1109/MC.2002.1039518Search in Google Scholar
Lee, Y., Kim, J., Son, M., & Lee, J. H. (2007, August). Implementation of accelerometer sensor module and fall detection monitoring system based on wireless sensor network. In Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE (pp. 2315-2318). IEEE.10.1109/IEMBS.2007.435278918002455Search in Google Scholar
Algredo-Badillo, I., Feregrino-Uribe, C., Cumplido, R., & Morales-Sandoval, M. (2010). Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11 i standard. Computers & Electrical Engineering, 36(3), 565-577.10.1016/j.compeleceng.2009.12.011Search in Google Scholar
Heron, S. (2009). Advanced encryption standard (AES). Network Security, 2009(12), 812. doi:10.1016/S1353-4858(10)70006-410.1016/S1353-4858(10)70006-4Search in Google Scholar
Crisco, J. J., Wilcox, B. J., Beckwith, J. G., Chu, J. J., Duhaime, A., Rowson, S., . . . Greenwald, R. M. (2011). Head impact exposure in collegiate football players. Journal of Biomechanics, 44(15), 2673-2678. doi:10.1016/j.jbiomech.2011.08.00310.1016/j.jbiomech.2011.08.003318929621872862Search in Google Scholar
Ibrahim S. I. Abuhaiba, & Hubboub, H. B. (2012). Swarm flooding attack against directed diffusion in wireless sensor networks. International Journal of Computer Network and Information Security, 4(12), 18-30.10.5815/ijcnis.2012.12.02Search in Google Scholar
Casson, I. R., Pellman, E. J., & Viano, D. C. (2008). Concussion in the national football league: An overview for neurologists. Neurologic Clinics, 26(1), 217-241. doi:10.1016/j.ncl.2007.11.00510.1016/j.ncl.2007.11.00518295092Search in Google Scholar
Shen, Yanfeng, and Victor Giurgiutiu. “Predictive modeling of nonlinear wave propagation for structural health monitoring with piezoelectric wafer active sensors.” Journal of Intelligent Material Systems and Structures 25.4 (2014): 506-52010.1177/1045389X13500572Search in Google Scholar