-
1
-
-
0036688074
-
A Survey on Sensor Networks
-
Akyildiz, I.F., Su, W., Sankarsubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communication Magazine, 102-114 (2002)
-
(2002)
IEEE Communication Magazine
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarsubramaniam, Y.3
Cayirci, E.4
-
3
-
-
49749114376
-
Anomaly detection in WSNs
-
Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly Detection in WSNs. In: IEEE Wireless Comm., Security in Ad hoc and Sensor Networks, pp. 34-40 (2008)
-
(2008)
IEEE Wireless Comm., Security in Ad Hoc and Sensor Networks
, pp. 34-40
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
-
4
-
-
33749041485
-
Applying Intrusion Detection Systems to WSNs
-
Roman, R., Zhou, J., Lopez, J.: Applying Intrusion Detection Systems to WSNs. In: IEEE Consumer Communications and Networking Conference, vol.1, pp. 640-644 (2006)
-
(2006)
IEEE Consumer Communications and Networking Conference
, vol.1
, pp. 640-644
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
6
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Kutyłowski, M., Cichoñ, J., Kubiak, P. (eds.) ALGOSENSORS 2007. Springer, Heidelberg
-
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Kutyłowski, M., Cichoñ, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol.4837, pp. 150-161. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4837
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
7
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks 2(4), 313-332 (2006)
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.4
, pp. 313-332
-
-
Loo, C.E.1
Ng, M.Y.2
Leckie, C.3
Palaniswami, M.4
-
8
-
-
36349036705
-
Is AIS based misbehavior detection suitable for wireless sensor networks?
-
Hong Kong
-
Drozda, M., Schaust, S., Szczerbicka, H.: Is AIS Based Misbehavior Detection Suitable for Wireless Sensor Networks? In: Proc. of IEEE Wireless Communications and Networking Conference, Hong Kong, pp. 3130-3135 (2007)
-
(2007)
Proc. of IEEE Wireless Communications and Networking Conference
, pp. 3130-3135
-
-
Drozda, M.1
Schaust, S.2
Szczerbicka, H.3
-
9
-
-
58349114050
-
Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of WSNs
-
China
-
Shaikh, R.A., Jameel, H., Auriol, B.J., Lee, S., Song, Y.J.: Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of WSNs. In: Proc. of International Symposium on Trust Computing, China, pp. 2038-2043 (2008)
-
(2008)
Proc. of International Symposium on Trust Computing
, pp. 2038-2043
-
-
Shaikh, R.A.1
Jameel, H.2
Auriol, B.J.3
Lee, S.4
Song, Y.J.5
-
10
-
-
73349102009
-
Abnormal node detection in WSN by pair based approach using IDS secure routing methodology
-
Ahmed, K.R., Ahmed, K., Munir, S., Asad, A.: Abnormal Node Detection in WSN by Pair Based Approach using IDS Secure Routing Methodology. International Journal of Computer Science and Network Security 8(12), 339-342 (2008)
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.12
, pp. 339-342
-
-
Ahmed, K.R.1
Ahmed, K.2
Munir, S.3
Asad, A.4
-
11
-
-
50249149820
-
An anomaly detection system for wireless sensor networks
-
Gupta, S., Zheng, R., Cheng, A.M.K.: An Anomaly Detection System for Wireless Sensor Networks. In: Proc. of IEEE International Conference on Mobile Ad hoc and Sensor Systems, pp. 1-9 (2007)
-
(2007)
Proc. of IEEE International Conference on Mobile Ad Hoc and Sensor Systems
, pp. 1-9
-
-
Gupta, S.1
Zheng, R.2
Cheng, A.M.K.3
-
12
-
-
41549167232
-
A framework for identifying compromised nodes in WSNs
-
Zhang, Q., Yu, T., Ning, P.: A Framework for Identifying Compromised Nodes in WSNs. ACM Transaction Information System Security 11(12) (2008)
-
(2008)
ACM Transaction Information System Security
, vol.11
, Issue.12
-
-
Zhang, Q.1
Yu, T.2
Ning, P.3
-
13
-
-
50649124844
-
Decentralized intrusion detection in WSNs
-
Canada
-
Da Silva, A.P.R., Martins, M.H.T., Rocha, B.P.S., Loureiro, A.A.F., Ruiz, L.B., Wong, H.C.: Decentralized Intrusion Detection in WSNs. In: Proc. of the 1st ACM Int. workshop on Quality of service & security in wireless networks, Canada, pp. 16-23 (2005)
-
(2005)
Proc. of the 1st ACM Int. Workshop on Quality of Service & Security in Wireless Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
14
-
-
33745917688
-
An anomaly detection algorithm for detecting attacks in WSNs
-
Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. Springer, Heidelberg
-
Phuong, T.V., Hung, L.X., Cho, S.J., Lee, Y.K., Lee, S.: An Anomaly Detection Algorithm for Detecting Attacks in WSNs. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol.3975, pp. 735-736. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3975
, pp. 735-736
-
-
Phuong, T.V.1
Hung, L.X.2
Cho, S.J.3
Lee, Y.K.4
Lee, S.5
|