-
1
-
-
33847156085
-
PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection)
-
R. Agarwal and M. V. Joshi, "PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)," Proceedings of First SIAM Conference on Data Mining, 2001.
-
(2001)
Proceedings of First SIAM Conference On Data Mining
-
-
Agarwal, R.1
Joshi, M.V.2
-
2
-
-
33745650833
-
The Holes Problem in Wireless Sensor Networks: A Survey
-
April
-
N. Ahmed, S. S. Kanhere, and S. Jha, "The Holes Problem in Wireless Sensor Networks: A Survey," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, pp. 4-18, April 2005.
-
(2005)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.9
, pp. 4-18
-
-
Ahmed, N.1
Kanhere, S.S.2
Jha, S.3
-
3
-
-
0037086890
-
Wireless sensor networks: A survey
-
F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
V. Bhuse and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," Journal of High Speed Networks, vol. 15, pp. 33-51, 2006.
-
(2006)
Journal of High Speed Networks
, vol.15
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
5
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
IAW '05
-
M. Brownfield, Y. Gupta, and N. Davis, "Wireless sensor network denial of sleep attack," in Information Assurance Workshop, 2005. IAW '05., pp. 356-364, 2005.
-
(2005)
Information Assurance Workshop, 2005
, pp. 356-364
-
-
Brownfield, M.1
Gupta, Y.2
Davis, N.3
-
6
-
-
33845507838
-
Group key distribution via local collaboration in wireless sensor networks
-
A. Chadha, Y. Liu, and S. K. Das, "Group key distribution via local collaboration in wireless sensor networks," in Sensor and Ad Hoc Communications and Networks, pp. 46-54, 2005.
-
(2005)
Sensor and Ad Hoc Communications and Networks
, pp. 46-54
-
-
Chadha, A.1
Liu, Y.2
Das, S.K.3
-
7
-
-
33745969132
-
Defending against Path-based DoS Attacks in Wireless Sensor Networks
-
J. Deng, R. Han, and S. Mishra, "Defending against Path-based DoS Attacks in Wireless Sensor Networks," in the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 89-96, 2005.
-
(2005)
3rd ACM Workshop On Security of Ad Hoc and Sensor Networks
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Transactions on Information and System Security (TISSEC) vol. 8, pp. 228-258, 2005.
-
(2005)
ACM Transactions On Information and System Security (TISSEC)
, vol.8
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
9
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," Wireless Communications, vol. 1, pp. 660-670, 2002.
-
(2002)
Wireless Communications
, vol.1
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
10
-
-
0037083574
-
Automated discovery of concise predictive rules for intrusion detection
-
G. Helmer, J. S. K. Wong, V. Honavar, and L. Miller, "Automated discovery of concise predictive rules for intrusion detection", Journal of Systems and Software, Vol. 60, Issue 3, pp. 165-175, 2002.
-
(2002)
Journal of Systems and Software
, vol.60
, Issue.3
, pp. 165-175
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
-
12
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and benchmark of block ciphers for wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, pp. 65-93, 2006.
-
(2006)
Acm Transactions On Sensor Networks (TOSN)
, vol.2
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
14
-
-
85031307530
-
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
-
C. E. Perkins and P. Bhagwat, "Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, pp. 234-244, 1994.
-
(1994)
ACM SIGCOMM Computer Communication Review
, vol.24
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
15
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
W. R. Pires, Jr., T. H. de Paula Figueiredo, H. C. Wong, and A. A. F. Loureiro, "Malicious node detection in wireless sensor networks," in Parallel and Distributed Processing Symposium, pp. 24-30, 2004.
-
(2004)
Parallel and Distributed Processing Symposium
, pp. 24-30
-
-
Pires Jr., W.R.1
de Paula Figueiredo, T.H.2
Wong, H.C.3
Loureiro, A.A.F.4
-
16
-
-
33745914280
-
Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
-
L. Qing, Q. X. Zhu, and M. W. Wang, "Design of a Distributed Energy-efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks," Computer communications, vol. 29, pp. 2230-2237, 2006.
-
(2006)
Computer Communications
, vol.29
, pp. 2230-2237
-
-
Qing, L.1
Zhu, Q.X.2
Wang, M.W.3
-
17
-
-
59649125973
-
Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols
-
D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, "Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols," Vehicular Technology, vol. 58, pp. 367-380, 2009.
-
(2009)
Vehicular Technology
, vol.58
, pp. 367-380
-
-
Raymond, D.R.1
Marchany, R.C.2
Brownfield, M.I.3
Midkiff, S.F.4
-
19
-
-
0034777089
-
Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks
-
E. Shih, et al, "Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks," in the 7th annual international conference on Mobile computing and networking, pp. 272-287, 2001.
-
(2001)
7th Annual International Conference On Mobile Computing and Networking
, pp. 272-287
-
-
Shih, E.1
-
20
-
-
33746150390
-
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
-
T. S. Sobh, "Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art," Computer Standards & interfaces, vol. 28, pp. 670-694, 2006.
-
(2006)
Computer Standards & Interfaces
, vol.28
, pp. 670-694
-
-
Sobh, T.S.1
-
22
-
-
33845719807
-
eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
-
W. T. Su, K. M. Chang, and Y. H. Kuo, "eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks," Computer Networks, vol. 51, pp. 1151-1168, 2006.
-
(2006)
Computer Networks
, vol.51
, pp. 1151-1168
-
-
Su, W.T.1
Chang, K.M.2
Kuo, Y.H.3
-
23
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
|