메뉴 건너뛰기




Volumn , Issue , 2004, Pages 343-346

Intrusion detection in sensor networks: A non-cooperative game approach

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC KEY CRYPTOGRAPHY; INTRUSION DETECTION; MARKOV DECISION PROCESS (MDP); SENSOR NETWORKS;

EID: 18844454790     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2004.1347798     Document Type: Conference Paper
Times cited : (141)

References (24)
  • 3
    • 17144375626 scopus 로고    scopus 로고
    • A non-cooperative game approach for intrusion detection in sensor networks
    • Fall
    • A. Agah, S. K. Das and K. Basu, " A Non-cooperative Game Approach for Intrusion Detection in Sensor Networks," VTC 2004, Fall 2004.
    • (2004) VTC 2004
    • Agah, A.1    Das, S.K.2    Basu, K.3
  • 7
    • 84948756561 scopus 로고    scopus 로고
    • A formal analysis of syversons rational exchange protocol
    • June
    • L. Buttyan, J. P. Hubaux and S. Capkun, "A Formal Analysis of Syversons Rational Exchange Protocol," CSFW, June, 2002.
    • (2002) CSFW
    • Buttyan, L.1    Hubaux, J.P.2    Capkun, S.3
  • 8
    • 2442601712 scopus 로고    scopus 로고
    • Self-organized public key management for mobile ad hoc networks
    • S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-Organized Public Key Management for Mobile Ad hoc Networks," MobiHoc, 2002.
    • (2002) MobiHoc
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 9
    • 0012797660 scopus 로고    scopus 로고
    • WCA: A weighted clustering algorithm for mobile ad hoc networks
    • Kluwer Academic Publishers
    • M. Chatterjee, S. K. Sajal and D. Turgut, "WCA: A Weighted Clustering Algorithm for mobile Ad Hoc Networks," Cluster Computing, Vol.5, Kluwer Academic Publishers, 2002, pp: 193-204.
    • (2002) Cluster Computing , vol.5 , pp. 193-204
    • Chatterjee, M.1    Sajal, S.K.2    Turgut, D.3
  • 10
  • 13
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: A game theoretic approach
    • M.Kodialam and T.V.Lakshman, "Detecting Network Intrusions via Sampling: A Game Theoretic Approach," INFOCOM, 2003.
    • (2003) INFOCOM
    • Kodialam, M.1    Lakshman, T.V.2
  • 22
    • 0034777089 scopus 로고    scopus 로고
    • Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks
    • Italy, July
    • E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A.Chandrakasan, "Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks," Proceedings of ACM MobiCom, Italy, July 2001, pp:272-286.
    • (2001) Proceedings of ACM MobiCom , pp. 272-286
    • Shih, E.1    Cho, S.2    Ickes, N.3    Min, R.4    Sinha, A.5    Wang, A.6    Chandrakasan, A.7
  • 24
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, " Denial of service in Sensor Networks," IEEE Computer, 2002, pp:54-62.
    • (2002) IEEE Computer , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.