-
1
-
-
19544395002
-
On optimal placement of intrusion detection modules in sensor networks
-
F. Anjum, D. Subhadrabandhu, S. Sarkar, and R. Shetty. On optimal placement of intrusion detection modules in sensor networks. In BROADNETS '04: Proceedings of the First International Conference on Broadband Networks, pages 690-699, 2004.
-
(2004)
BROADNETS '04: Proceedings of the First International Conference on Broadband Networks
, pp. 690-699
-
-
Anjum, F.1
Subhadrabandhu, D.2
Sarkar, S.3
Shetty, R.4
-
2
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Technical Report 99-15, Chalmers University of Technology, March
-
S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers University of Technology, March 2000.
-
(2000)
-
-
Axelsson, S.1
-
3
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
V. Bhuse and A. Gupta. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 15(1):33-51, 2006.
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
4
-
-
0030102105
-
Unreliable failure detectors for reliable distributed systems
-
T. D. Chandra and S. Toueg. Unreliable failure detectors for reliable distributed systems. J. ACM, 43(2):225-267, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.2
, pp. 225-267
-
-
Chandra, T.D.1
Toueg, S.2
-
5
-
-
50649124844
-
Decentralized intrusion detection in wireless sensor networks
-
ACM Press, October
-
A. P. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05). ACM Press, October 2005.
-
(2005)
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05)
-
-
da Silva, A.P.1
Martins, M.2
Rocha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.C.6
-
6
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
7
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. ACM SIGPLAN Notices, 35(11):93-104, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
8
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. Software Engineering, 21(3):181-199, 1995.
-
(1995)
Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
9
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
Annual report, Computer Science Laboratory, SRI International, Menlo Park, CA, March
-
H. S. Javitz and A. Valdes. The NIDES statistical component: Description and justification. Annual report, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1994.
-
(1994)
-
-
Javitz, H.S.1
Valdes, A.2
-
10
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Networks Journal, 1(2-3):293-315, September 2003.
-
(2003)
AdHoc Networks Journal
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
11
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom '00), pages 255-265, August 2000.
-
(2000)
Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom '00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
14
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Montreal, Canada, August
-
I. Onat and A. Miri. An intrusion detection system for wireless sensor networks. In Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, volume 3, Montreal, Canada, August 2005.
-
(2005)
Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, vol.3
-
-
Onat, I.1
Miri, A.2
-
15
-
-
84976810569
-
Reaching agreement in the presence of faults
-
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
16
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: security protocols for sensor networks. Wirel. Netw., 8(5):521-534, 2002.
-
(2002)
Wirel. Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
17
-
-
33749041485
-
Applying intrusion detection systems to wireless sensor networks
-
Las Vegas, USA, January
-
R. Roman, J. Zhou, and J. Lopez. Applying intrusion detection systems to wireless sensor networks. In Proceedings of IEEE Consumer Communications and Networking Conference (CCNC '06), pages 640-644, Las Vegas, USA, January 2006.
-
(2006)
Proceedings of IEEE Consumer Communications and Networking Conference (CCNC '06)
, pp. 640-644
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
20
-
-
44149097496
-
Design and performance evaluation of efficient consensus protocols for mobile ad hoc networks
-
Senior Member-Jiannong Cao
-
W. Wu, J. Yang, and M. Raynal. Design and performance evaluation of efficient consensus protocols for mobile ad hoc networks. IEEE Trans. Comput., 56(8):1055-1070, 2007. Senior Member-Jiannong Cao.
-
(2007)
IEEE Trans. Comput
, vol.56
, Issue.8
, pp. 1055-1070
-
-
Wu, W.1
Yang, J.2
Raynal, M.3
|