-
1
-
-
18844454790
-
A non-cooperative game approach for intrusion detection in sensor networks
-
A. Agah, S. K. Das, K. Basu, and M. Asadi. A non-cooperative game approach for intrusion detection in sensor networks. In Third IEEE International Symposium on Network Computing and Applications, pages 343–346, 2004.
-
(2004)
Third IEEE International Symposium on Network Computing and Applications
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
2
-
-
0036688074
-
A survey on sensor networks
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. In IEEE Communication Magazine 40 (8), 2002.
-
(2002)
IEEE Communication Magazine
, vol.40
, Issue.8
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
4143141932
-
Signature-based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols
-
Wireless Security Symposium, Orlando, FL
-
F. Anjum, D. Subhadrabandhu, and S. Sarkar. Signature-based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Vehicular Technology Conference, Wireless Security Symposium, Orlando, FL, 2003.
-
Vehicular Technology Conference
, pp. 2003
-
-
Anjum, F.1
Subhadrabandhu, D.2
Sarkar, S.3
-
6
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1stACMInternationalWorkshop on Quality of Service and Security in Wireless and Mobile Networks, pages 16–23, 2005.
-
(2005)
Proceedings of the 1Stacminternationalworkshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
8
-
-
3142684688
-
Self-organized criticality and stochastic learningbased intrusion detection system for wireless sensor networks
-
S. S. Doumit and D.P. Agrawal. Self-organized criticality and stochastic learningbased intrusion detection system for wireless sensor networks. In MILCOM: IEEE Military Communications Conference, pages 609–614, 2003.
-
(2003)
MILCOM: IEEE Military Communications Conference
, pp. 609-614
-
-
Doumit, S.S.1
Agrawal, D.P.2
-
10
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
F. Hu and N. K. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks, 3(1):69–89, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.K.2
-
12
-
-
85056972884
-
-
IEEE. Standard for part 15.4:Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4, IEEE, New York
-
IEEE. Standard for part 15.4:Wireless MAC and PHY specifications for low rate WPAN. IEEE Std 802.15.4, IEEE, New York, Oct. 2003.
-
(2003)
-
-
-
15
-
-
24344456201
-
Applying mobile agent technology to intrusion detection
-
Technical University of Vienna
-
C. Kruegel. Applying mobile agent technology to intrusion detection. In Distributed Systems Group, Technical University of Vienna, 2002.
-
(2002)
Distributed Systems Group
-
-
Kruegel, C.1
-
17
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
A. Mishra, K. Nadkarni, and A. Patcha. Intrusion detection in wireless ad hoc networks. IEEEWireless Communications, Vol. 11, No. 1, pp. 48–60, February 2004.
-
(2004)
Ieeewireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
21
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM, 47(6):53–57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
22
-
-
33749041485
-
Applying intrusion detection systems to wireless sensor networks
-
R. Roman, J. Zhou, and J. Lopez. Applying intrusion detection systems to wireless sensor networks. In Proc. CCNC 2006, pp. 640–644.
-
(2006)
Proc. CCNC
, pp. 640-644
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
23
-
-
85056929157
-
-
http://www.snort.org, Date visited: April, 17, 2006.
-
(2006)
-
-
-
26
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54–62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
29
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Y. Zhang, W. Lee, and Y.-A. Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks, Vol. 9, pp. 545–556, 2003.
-
(2003)
Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|