-
2
-
-
44649189449
-
Towards Intrusion Detection in Wireless Sensor Networks
-
Paris, April
-
Krontiris Ioannis, Tassos Dimitriou, and Felix C. Freiling, "Towards Intrusion Detection in Wireless Sensor Networks", EuropeanWireless Conference, Paris, April 2007
-
(2007)
EuropeanWireless Conference
-
-
Ioannis, K.1
Dimitriou, T.2
Freiling, F.C.3
-
3
-
-
34548852836
-
CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks
-
Bin Xiao, Bo Yu, and Chuanshan Gao, "CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks", journal of parallel distributed computing, 67, 2007
-
(2007)
journal of parallel distributed computing
, vol.67
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
5
-
-
51349133681
-
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines
-
Sensor Networks and Information (ISSNIP),Dec
-
Sophia Kaplantzis, Alistair Shilton, Nallasamy Mani, and Ahmet Sekercioglu, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Support Vector Machines", 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP),Dec 2007.
-
(2007)
3rd International Conference on Intelligent Sensors
-
-
Kaplantzis, S.1
Shilton, A.2
Mani, N.3
Sekercioglu, A.4
-
6
-
-
84856936491
-
Wireless Sensor Networks Security: A New Approach
-
kuldeep, K. Sharma, and M. K. Ghose, "Wireless Sensor Networks Security: A New Approach", DCOM 2008, Dec14-17, 2008.
-
(2008)
DCOM 2008
-
-
kuldeep1
Sharma, K.2
Ghose, M.K.3
-
8
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
January
-
Vijay Bhuse, Ajay Gupta, "Anomaly intrusion detection in wireless sensor networks", Journal of High Speed Networks, Volume 15, Issue 1, January 2006.
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
-
-
Bhuse, V.1
Gupta, A.2
-
10
-
-
2442604387
-
A game theory based approach for security in wireless sensor networks
-
A. Agah, S. K. Das and K. Basu, "A game theory based approach for security in wireless sensor networks", IEEE International Conference on Performance, Computing, and Communications, 2004.
-
(2004)
IEEE International Conference on Performance, Computing, and Communications
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
-
12
-
-
24144441735
-
Preventing DoS attack in Sensor Networks: A Game Theoretic Approach
-
May
-
A. Agah, K. Basu and S. K. Das, "Preventing DoS attack in Sensor Networks: A Game Theoretic Approach", IEEE International Conference on Communications (ICC 2005), Volume 5, Issue , 16-20 May 2005
-
(2005)
IEEE International Conference on Communications (ICC
, vol.5
, Issue.and 16-20
-
-
Agah, A.1
Basu, K.2
Das, S.K.3
-
16
-
-
70449488998
-
A Novel Game Theoretic Framework for Security in Wireless Sensor Networks
-
Ph. D Thesis, UT Austin, December
-
A. Agah, "A Novel Game Theoretic Framework for Security in Wireless Sensor Networks", Ph. D Thesis, UT Austin, December 2005.
-
(2005)
-
-
Agah, A.1
-
20
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks", Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and Communications Security
-
-
Eschenauer, L.1
Gligor, V.D.2
-
21
-
-
84947273682
-
The Sybil Attack
-
First International Workshop on Peer-to-peer Systems
-
J. R. Douceur, "The Sybil Attack", First International Workshop on Peer-to-peer Systems, LNCS 2429, 2002.
-
(2002)
LNCS
, vol.2429
-
-
Douceur, J.R.1
-
22
-
-
70449499673
-
WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks
-
J.-H. Yun, I.-H. Kim, J.-H. Lim, and S.-W. Seo, "WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks", Ubiquitous Convergence Technology, ICUCT, 2006.
-
(2006)
Ubiquitous Convergence Technology, ICUCT
-
-
Yun, J.-H.1
Kim, I.-H.2
Lim, J.-H.3
Seo, S.-W.4
-
23
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks", Computer, 35(10), 2002.
-
(2002)
Computer
, vol.35
, Issue.10
-
-
Wood, A.D.1
Stankovic, J.A.2
-
24
-
-
33750938093
-
Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks
-
M. Kim, I. Doh, and K. Chae, "Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks", The 8th International Conference Advanced Communication Technology, (ICACT 2006), 2006.
-
(2006)
The 8th International Conference Advanced Communication Technology, (ICACT
-
-
Kim, M.1
Doh, I.2
Chae, K.3
-
25
-
-
18844454790
-
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
-
IEEE Computer Society
-
A. Agah, S. K. Das, K. Basu, and M. Asadi, "Intrusion Detection in Sensor Networks: a Non-Cooperative Game Approach", Proceedings of Third IEEE International Symposium on the Network Computing and Applications (NCA'04), IEEE Computer Society, 2004.
-
(2004)
Proceedings of Third IEEE International Symposium on the Network Computing and Applications (NCA'04)
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
26
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in sensor networks", Computer, 36(10), 2003.
-
(2003)
Computer
, vol.36
, Issue.10
-
-
Chan, H.1
Perrig, A.2
-
27
-
-
34548031104
-
An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks
-
September
-
E. C.-H. Ngai, J. Liu, and M.R. Lyu, "An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks", Computer Communications, vol. 30, September 2007.
-
(2007)
Computer Communications
, vol.30
-
-
Ngai, E.C.-H.1
Liu, J.2
Lyu, M.R.3
-
28
-
-
0041939831
-
Cooperation in wireless ad hoc networks
-
Srinivasan V, Nuggehalli P, Chiasserini C-F, Rao RR., "Cooperation in wireless ad hoc networks", Proceedings of IEEE INFOCOM, 2003.
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.-F.3
Rao, R.R.4
-
29
-
-
0036688074
-
A survey on Sensor networks
-
Aug
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on Sensor networks", IEEE Communication Magazine, Aug. 2002.
-
(2002)
IEEE Communication Magazine
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
30
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H.T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks", Proc. Of ACM MobiCom, 2000.
-
(2000)
Proc. Of ACM MobiCom
-
-
Karp, B.1
Kung, H.T.2
-
32
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", proc. Of the 6th annual international conference on mobile computing and networking (MobiCom '00), 2000.
-
(2000)
proc. Of the 6th annual international conference on mobile computing and networking (MobiCom '00)
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
33
-
-
70449501175
-
-
nd ed, Chapman & Hall/CRC, 2002, ISN:1-58488-206-9.
-
nd ed, Chapman & Hall/CRC, 2002, ISN:1-58488-206-9.
-
-
-
|