메뉴 건너뛰기




Volumn 7 LNEE, Issue , 2008, Pages 277-296

A fault-tolerant scheme for detection of DDoS attack patterns in cluster-based wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77952188721     PISSN: 18761100     EISSN: 18761119     Source Type: Book Series    
DOI: 10.1007/978-0-387-77320-9_14     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 3
    • 0036804084 scopus 로고    scopus 로고
    • Defending Against Flooding-based Distributed Denial of Service Attacks: A Tutorial
    • Chang, R. (2004) Defending Against Flooding-based Distributed Denial of Service Attacks: A Tutorial. IEEE Communications Magazine: 42-51
    • (2004) IEEE Communications Magazine , pp. 42-51
    • Chang, R.1
  • 4
    • 8344262333 scopus 로고    scopus 로고
    • A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge
    • Du, W., Deng, J., Han, Y., Chen, S., and Varshney, P. (2004) A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of IEEE INFOCOM
    • (2004) Proceedings of IEEE INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 6
    • 84978422134 scopus 로고    scopus 로고
    • Fine-grained Network Time Synchronization using Reference Broadcasts
    • Elson, J., Girod, L., and Estrin, D. (2002) Fine-grained Network Time Synchronization using Reference Broadcasts. ACM SIGOPS Operating Systems Review 36: 147-163
    • (2002) ACM SIGOPS Operating Systems Review , vol.36 , pp. 147-163
    • Elson, J.1    Girod, L.2    Estrin, D.3
  • 8
    • 25844493197 scopus 로고    scopus 로고
    • A Beacon-less Location Discovery Scheme forWireless Sensor Networks
    • Fang, L., Du,W., and Ning, P. (2005) A Beacon-less Location Discovery Scheme forWireless Sensor Networks. In Proceedings of IEEE INFOCOM
    • (2005) Proceedings of IEEE INFOCOM
    • Fang, L.1    Du, W.2    Ning, P.3
  • 24
    • 32244436344 scopus 로고    scopus 로고
    • An anomaly intrusion detection system based on vector quantization
    • DOI 10.1093/ietisy/e89-d.1.201
    • Zheng, J., and Hu, M. (2006) An Anomaly Intrusion Detection System Based On Vector Quantization. IEICE Transactions on Information and Systems (2006): 201-210 (Pubitemid 43214318)
    • (2006) IEICE Transactions on Information and Systems , vol.E89-D , Issue.1 , pp. 201-230
    • Zheng, J.1    Hu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.