메뉴 건너뛰기




Volumn , Issue , 2011, Pages 49-52

A light-weight ranger intrusion detection system on wireless sensor networks

Author keywords

Component; Intrusion detection system; Ontology; Sybil attack; Wireless sensor networks

Indexed keywords

COMPONENT; INTRUSION DETECTION SYSTEM; INTRUSION DETECTION SYSTEMS; ISOLATION TABLE; LIGHT WEIGHT; ONTOLOGY CONCEPTS; ONTOLOGY-BASED; SECURITY REQUIREMENTS; SYBIL ATTACK; WIRELESS COMMUNICATIONS;

EID: 80455163158     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICGEC.2011.20     Document Type: Conference Paper
Times cited : (15)

References (10)
  • 1
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey, Computer Networks," vol. 38, no. 4, 2001, pp. 393-422. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 2
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and 54 ANN for intrusion detection
    • W. H. Chen, S. H. Hsu, and H. P. Shen, "Application of SVM and 54 ANN for intrusion detection," Computers & Operations Research, vol. 32, 2005, pp. 2617-2634.
    • (2005) Computers & Operations Research , vol.32 , pp. 2617-2634
    • Chen, W.H.1    Hsu, S.H.2    Shen, H.P.3
  • 4
    • 34447639073 scopus 로고    scopus 로고
    • A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
    • DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
    • N. Toosi, and M. Kahani, "A New Approach to Intrusion detection Based on An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers," Computer Communications, vol. 30, no. 10, 2007, pp. 2201-2212. (Pubitemid 47094963)
    • (2007) Computer Communications , vol.30 , Issue.10 , pp. 2201-2212
    • Toosi, A.N.1    Kahani, M.2
  • 6
    • 39149117388 scopus 로고    scopus 로고
    • Threshold-based intrusion detection in ad hoc networks and secure AODV
    • DOI 10.1016/j.adhoc.2007.05.001, PII S1570870507000960
    • J. Patwardhan, M. Parker, A. Iorga, T. Joshi, Karygiannis and Y. Yesha, "Threshold-based Intrusion Detection in Ad-hoc Networks and Secure AODV," Ad Hoc Networks, vol. 6, no. 4, 2008, pp. 578-599. (Pubitemid 351258394)
    • (2008) Ad Hoc Networks , vol.6 , Issue.4 , pp. 578-599
    • Patwardhan, A.1    Parker, J.2    Iorga, M.3    Joshi, A.4    Karygiannis, T.5    Yesha, Y.6
  • 7
    • 33646156614 scopus 로고    scopus 로고
    • Web page classification based on a support vector machine
    • R. C. Chen and C. H. Hsieh, "Web Page Classification Based on A Support Vector Machine," Expert System with Applications, vol. 31, 2006, pp. 427-435.
    • (2006) Expert System with Applications , vol.31 , pp. 427-435
    • Chen, R.C.1    Hsieh, C.H.2
  • 8
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • M. Depren, E. Topallar, and M. Kemal, "An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks," Expert Systems with Applications, vol. 29, 2005, pp. 713-722.
    • (2005) Expert Systems with Applications , vol.29 , pp. 713-722
    • Depren, M.1    Topallar, E.2    Kemal, M.3
  • 9
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMs for real-time intrusion detection with different considerations
    • DOI 10.1016/j.comcom.2005.01.014, PII S0140366405000484
    • Z. Zhang, and H. Shen "Application of Online-Training SVMs for Real-time Intrusion detection with Different Considerations," Computer Communications, vol. 28, 2005, pp. 1428-1442. (Pubitemid 40952614)
    • (2005) Computer Communications , vol.28 , Issue.12 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2
  • 10
    • 33746752558 scopus 로고    scopus 로고
    • A fast host-based intrusion detection system using rough set theory
    • S. Rawat, V. Gulati, and A. Pujari, "A fast Host-Based Intrusion Detection System Using Rough Set Theory," Transactions on Rough Sets IV, LNCS 3700, 2005, pp. 144-161.
    • (2005) Transactions on Rough Sets IV, LNCS , vol.3700 , pp. 144-161
    • Rawat, S.1    Gulati, V.2    Pujari, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.