-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393422, 2002.
-
(2002)
Computer Networks
, vol.38
, pp. 393422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
78549251230
-
A fault-tolerant scheme for detection of DDoS attack patterns in cluster-based wireless sensor networks
-
Z. A. Baig and A. I. Khan, "A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-based Wireless Sensor Networks," Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects, pp. 277290, 2008.
-
(2008)
Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects
, pp. 277290
-
-
Baig, Z.A.1
Khan, A.I.2
-
5
-
-
77952147526
-
Fuzzy-logic based decision making for detecting distributed node exhaustion attacks in wireless sensor networks
-
Z. A. Baig, S. A. Khan, "Fuzzy-Logic Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks," In Proc. of the 2nd Intl' Conf' on Future Networks, 2010.
-
(2010)
Proc. of the 2nd Intl' Conf' on Future Networks
-
-
Baig, Z.A.1
Khan, S.A.2
-
6
-
-
34247503978
-
Overview of sensor networks
-
Aug.
-
D. Culler, D. Estrin, and M. Srivastava, "Overview of sensor networks," IEEE Computer, pp. 4149, Aug. 2004.
-
(2004)
IEEE Computer
, pp. 4149
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
8
-
-
34147191463
-
A new fuzzy operator and its application to topology design of distributed local area networks
-
S. A. Khan and A. P. Engelbrecht, "A New Fuzzy Operator and its Application to Topology Design of Distributed Local Area Networks," Information Sciences, vol. 177, no. 12, pp. 2692-2711, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.12
, pp. 2692-2711
-
-
Khan, S.A.1
Engelbrecht, A.P.2
-
9
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communcations of the ACM, vol. 47, no. 6, pp. 5357, June 2004.
-
(2004)
Communcations of the ACM
, vol.47
, Issue.6
, pp. 5357
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
10
-
-
2342540625
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer Magazine, pp. 5462, Oct. 2002.
-
(2002)
IEEE Computer Magazine
, pp. 5462
-
-
Wood, A.1
Stankovic, J.2
-
11
-
-
0023855863
-
On ordered weighted averaging aggregation operators in multicriteria decision-making
-
Jan
-
R. Y. Yager, "On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decision-making," IEEE Transactions on Systems, Man, and Cybernetics, vol. 18, no. 1, pp. 183190, Jan 1988.
-
(1988)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.18
, Issue.1
, pp. 183190
-
-
Yager, R.Y.1
-
12
-
-
27544469503
-
A study on fuzzy intrusion detection
-
J. T. Yao, S. L. Zhao, L. V. Saxton, "A study on fuzzy intrusion detection", In Proc. of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, 2005. pp. 23-30.
-
(2005)
Proc. of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
, pp. 23-30
-
-
Yao, J.T.1
Zhao, S.L.2
Saxton, L.V.3
-
13
-
-
34248666540
-
Fuzzy sets
-
L. A. Zadeh, "Fuzzy Sets," Information Control, vol. 8, pp. 338353, 1965.
-
(1965)
Information Control
, vol.8
, pp. 338353
-
-
Zadeh, L.A.1
-
14
-
-
0015558134
-
Outline of a new approach to the analysis of complex systems and decision processes
-
L. A. Zadeh, "Outline of a New Approach to the Analysis of Complex Systems and Decision Processes," IEEE Transaction Systems, Man, and Cybernetics, vol. 3, no. 1, pp. 2844, 1973.
-
(1973)
IEEE Transaction Systems, Man, and Cybernetics
, vol.3
, Issue.1
, pp. 2844
-
-
Zadeh, L.A.1
-
15
-
-
33845947480
-
Applying data mining of fuzzy association rules to network intrusion detection
-
A. El-Semary, J. Edmonds, J. Gonzalez-Pino, M. Papa, "Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection", In Proc. of IEEE Information Assurance Workshop, 2006, pp. 100-107.
-
(2006)
Proc. of IEEE Information Assurance Workshop
, pp. 100-107
-
-
El-Semary, A.1
Edmonds, J.2
Gonzalez-Pino, J.3
Papa, M.4
-
16
-
-
69249213464
-
Network forensics based on fuzzy logic and expert system
-
N. Liao, S. Tiana, T. Wanga, "Network forensics based on fuzzy logic and expert system", Computer Communications, Vol. 32, no. 17, 2009, pp. 1881-1892.
-
(2009)
Computer Communications
, vol.32
, Issue.17
, pp. 1881-1892
-
-
Liao, N.1
Tiana, S.2
Wanga, T.3
-
17
-
-
78549240053
-
An approach to a new network security architecture for academic environments
-
M. Mohajerani, A. Moeini, "An Approach to a New Network Security Architecture for Academic Environments", Lecture Notes in Computer Science, Volume 2434, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2434
-
-
Mohajerani, M.1
Moeini, A.2
-
18
-
-
70350778315
-
Threat modeling using fuzzy logic paradigm
-
A. Sodiya, S. Onashoga, B. Oladunjoye, "Threat Modeling Using Fuzzy Logic Paradigm" Issues in Informing Science and Information Technology Volume 4, 2007, pp. 53-61.
-
(2007)
Issues in Informing Science and Information Technology
, vol.4
, pp. 53-61
-
-
Sodiya, A.1
Onashoga, S.2
Oladunjoye, B.3
-
19
-
-
78549247632
-
Interleaved hop-by-hop authentication using fuzzy logic to defend against of false report injection by replaying an attack
-
J. H. Kim, T. H. Cho, "Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report Injection by Replaying an attack", International Journal of Computer Science and Network Security, Vol. 9, no.7, 2009, pp. 91-96.
-
(2009)
International Journal of Computer Science and Network Security
, vol.9
, Issue.7
, pp. 91-96
-
-
Kim, J.H.1
Cho, T.H.2
|