-
1
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, AK, May 11
-
Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International. Workshop on Sensor Network Protocols and Applications, Anchorage, AK,. May 11, 2003
-
(2003)
Proceedings of the 1st IEEE International. Workshop on Sensor Network Protocols and Applications
-
-
Karlof, C.1
Wagner, D.2
-
2
-
-
38049170463
-
-
James Newsome, Elaine Shi, Dawn Song, Adrian Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, IPSN'04, April 26-27, 2004
-
James Newsome, Elaine Shi, Dawn Song, Adrian Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, IPSN'04, April 26-27, 2004
-
-
-
-
3
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
San Francisco, April
-
Y-C Hu, A.Perrig, D.B.Johnso, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Proc of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2003), San Francisco, April, 2003: 1976-1986
-
(2003)
Proc of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnso, D.B.3
-
5
-
-
34250303156
-
A game theory based approach for security in wireless sensor networks
-
Afrand Agah Dajal K. Das and Kalyan Basu, A game theory based approach for security in wireless sensor networks, IPCCC 2004 IEEE, 2004
-
(2004)
IPCCC 2004 IEEE
-
-
Agah, A.1
Das, D.K.2
Basu, K.3
-
7
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch, Gary B. Lamont, An artificial immune system architecture for computer security applications. IEEE Trans. Evolutionary Computation 6(3): 252-280, 2002
-
(2002)
IEEE Trans. Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
10
-
-
84969513597
-
-
O. Kachirski and R. Guha, Elective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks, Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03), p. 57.1, January 2003.
-
O. Kachirski and R. Guha, Elective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks, Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03), p. 57.1, January 2003.
-
-
-
-
11
-
-
34250351345
-
-
USA
-
Soumya Banerjee, Crina Groşan, Ajith Abraham and P.K. Mahanti, Intrusion Detection on Sensor Networks Using Emotional Ants, International Journal of Applied Science and Computations, USA, Vol.12, No.3, pp.152-173, 2005.
-
(2005)
Intrusion Detection on Sensor Networks Using Emotional Ants, International Journal of Applied Science and Computations
, vol.12
, Issue.3
, pp. 152-173
-
-
Banerjee, S.1
Groşan, C.2
Abraham, A.3
Mahanti, P.K.4
-
12
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
September
-
Y. Zhang, W. Lee, and Y. Huang, Intrusion Detection Techniques for Mobile Wireless Networks, ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003.
-
(2003)
ACM/Kluwer Wireless Networks Journal (ACM WINET)
, vol.9
, Issue.5
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
13
-
-
38049096973
-
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe, A General Cooperative Intrusion Detection Architecture for MANETs, Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, March 2005.
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe, A General Cooperative Intrusion Detection Architecture for MANETs, Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, March 2005.
-
-
-
-
14
-
-
38049104688
-
-
Tiranuch Anantvalee, Jie Wu, A Survey on Intrusion Detection in Mobile Ad Hoc, Y. Xiao, X. Shen, and D.-Z. Du (Eds.),Wireless/Mobile Network Security, Springer, pp. 170 - 196, 2006
-
Tiranuch Anantvalee, Jie Wu, A Survey on Intrusion Detection in Mobile Ad Hoc, Y. Xiao, X. Shen, and D.-Z. Du (Eds.),Wireless/Mobile Network Security, Springer, pp. 170 - 196, 2006
-
-
-
-
15
-
-
24944560667
-
The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks
-
Mar, New Orleans, USA
-
Chien-Chung Su, Ko-Ming Chang, Mong-Fong Horng, Yau-Hwang Kuo, The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks, 2005 IEEE Wireless Communications and Networking Conference (WCNC05), Mar. 2005, New Orleans, USA.
-
(2005)
2005 IEEE Wireless Communications and Networking Conference (WCNC05)
-
-
Su, C.1
Chang, K.2
Horng, M.3
Kuo, Y.4
|