-
1
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 15(1), 33-51 (2006)
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
2
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
ACM Press, New York
-
da Silva, A.P., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet 2005), pp. 16-23. ACM Press, New York (2005)
-
(2005)
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet
, pp. 16-23
-
-
da Silva, A.P.1
Martins, M.2
Rocha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.C.6
-
3
-
-
84866538231
-
-
Kargl, F., Klenk, A., Weber, M., Schlott, S.: Sensors for detection of misbehaving nodes in MANETs. In: Flegel, U., Meier, M. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany. LNI, 46, pp. 83-97. GI (2004)
-
Kargl, F., Klenk, A., Weber, M., Schlott, S.: Sensors for detection of misbehaving nodes in MANETs. In: Flegel, U., Meier, M. (eds.) Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany. LNI, vol. 46, pp. 83-97. GI (2004)
-
-
-
-
4
-
-
49949098630
-
Towards intrusion detection in wireless sensor networks
-
Paris, France April
-
Krontiris, I., Dimitriou, T., Freiling, F.C.: Towards intrusion detection in wireless sensor networks. In: Proceedings of the 13th European Wireless Conference, Paris, France (April 2007)
-
(2007)
Proceedings of the 13th European Wireless Conference
-
-
Krontiris, I.1
Dimitriou, T.2
Freiling, F.C.3
-
5
-
-
73349093221
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Wroclaw, Poland July
-
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. In: Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors 2007), Wroclaw, Poland (July 2007)
-
(2007)
Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
6
-
-
0036499227
-
Negotiation-based protocols for disseminating information in wireless sensor networks
-
Kulik, J., Heinzelman, W., Balakrishnan, H.: Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless Networks 8(2/3), 169-185 (2002)
-
(2002)
Wireless Networks
, vol.8
, Issue.2-3
, pp. 169-185
-
-
Kulik, J.1
Heinzelman, W.2
Balakrishnan, H.3
-
7
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
8
-
-
61649116164
-
-
International Journal of Distributed Sensor Networks
-
Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks (2005)
-
(2005)
Intrusion detection for routing attacks in sensor networks
-
-
Loo, C.E.1
Ng, M.Y.2
Leckie, C.3
Palaniswami, M.4
-
9
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications 11(1), 48-60 (2004)
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
10
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Onat, I., Miri, A.: An intrusion detection system for wireless sensor networks. In: Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 3, pp. 253-259 (2005)
-
(2005)
Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
, vol.3
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
11
-
-
84976810569
-
Reaching agreement in the presence of faults
-
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM 27(2), 228-234 (1980)
-
(1980)
Journal of the ACM
, vol.27
, Issue.2
, pp. 228-234
-
-
Pease, M.1
Shostak, R.2
Lamport, L.3
-
12
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
Woo, A., Tong, T., Culler, D.: Taming the underlying challenges of reliable multihop routing in sensor networks. In: SenSys 2003: Proceedings of the 1st international conference on Embedded networked sensor systems, pp. 14-27 (2003)
-
(2003)
SenSys 2003: Proceedings of the 1st international conference on Embedded networked sensor systems
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.3
|