-
1
-
-
84882927239
-
Wireless sensor networks: Principles and applications
-
C. Townsend and S. Arms, "Wireless sensor networks: Principles and applications," Sensor technology handbook, vol. 11, no. 6, pp. 575-589, 2005.
-
(2005)
Sensor Technology Handbook
, vol.11
, Issue.6
, pp. 575-589
-
-
Townsend, C.1
Arms, S.2
-
2
-
-
61649086771
-
Cooperative intrusion detection in wireless sensor networks
-
I. Krontiris, Z. Benenson, T. Giannetsos, F. Freiling, and T. Dimitriou, "Cooperative intrusion detection in wireless sensor networks," Wireless Sensor Networks, pp. 263-278, 2009.
-
(2009)
Wireless Sensor Networks
, pp. 263-278
-
-
Krontiris, I.1
Benenson, Z.2
Giannetsos, T.3
Freiling, F.4
Dimitriou, T.5
-
3
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
ACM
-
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. ACM, 2005, pp. 16-23.
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks
, pp. 16-23
-
-
Da Silva, A.P.R.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
5
-
-
79952060290
-
Neighbor-based intrusion detection for wireless sensor networks
-
Los Alamitos, CA, USA: IEEE Computer Society
-
A. Stetsko, L. Folkman, and V. Matyas, "Neighbor-based intrusion detection for wireless sensor networks," in International Conference on Wireless and Mobile Communications. Los Alamitos, CA, USA: IEEE Computer Society, 2010, pp. 420-425.
-
(2010)
International Conference on Wireless and Mobile Communications
, pp. 420-425
-
-
Stetsko, A.1
Folkman, L.2
Matyas, V.3
-
6
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
IEEE, Vol. 3
-
I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," in Wireless And Mobile Computing, Networking And Communications, 2005.(WiMob'2005), IEEE International Conference on, vol. 3. IEEE, 2005, pp. 253-259 Vol. 3.
-
(2005)
Wireless and Mobile Computing, Networking and Communications, 2005.(WiMob'2005), IEEE International Conference on
, vol.3
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
7
-
-
84866538231
-
Sensors for detection of misbehaving nodes in manets
-
Citeseer
-
F. Kargl, A. Klenk, M. Weber, and S. Schlott, "Sensors for detection of misbehaving nodes in manets," in Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA. Citeseer, 2004, pp. 83-97.
-
(2004)
Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA
, pp. 83-97
-
-
Kargl, F.1
Klenk, A.2
Weber, M.3
Schlott, S.4
-
8
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
L. C. Eik, N. M. Yong, L. Christopher, and P. Marimuthu, "Intrusion detection for routing attacks in sensor networks," International Journal of Distributed Sensor Networks, vol. 2, no. 4, pp. 313-332, 1900.
-
(1900)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.4
, pp. 313-332
-
-
Eik, L.C.1
Yong, N.M.2
Christopher, L.3
Marimuthu, P.4
-
9
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
V. Bhuse and A. Gupta, "Anomaly intrusion detection in wireless sensor networks," Journal of High Speed Networks, vol. 15, no. 1, pp. 33-51, 2006.
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
10
-
-
84866549338
-
-
Master's thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA
-
A. Giannetsos, "Intrusion detection in wireless sensor networks," Master's thesis, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA, 2008.
-
(2008)
Intrusion Detection in Wireless Sensor Networks
-
-
Giannetsos, A.1
-
12
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, "Intrusion detection of sinkhole attacks in wireless sensor networks," Algorithmic Aspects of Wireless Sensor Networks, pp. 150-161, 2008.
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
13
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," Wireless Communications, IEEE, vol. 11, no. 1, pp. 48-60, 2004.
-
(2004)
Wireless Communications, IEEE
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
14
-
-
56749128173
-
Lidea: A distributed lightweight intrusion detection architecture for sensor networks
-
ACM
-
I. Krontiris, T. Giannetsos, and T. Dimitriou, "Lidea: A distributed lightweight intrusion detection architecture for sensor networks," in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, pp. 1-10.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks
, pp. 1-10
-
-
Krontiris, I.1
Giannetsos, T.2
Dimitriou, T.3
-
15
-
-
84895207016
-
Tinyos: An operating system for sensor networks
-
P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, and E. Brewer, "Tinyos: An operating system for sensor networks," Ambient intelligence, vol. 35, 2005.
-
(2005)
Ambient Intelligence
, vol.35
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
-
16
-
-
78649951433
-
An intrusion detection system for critical information infrastructures using wireless sensor network technologies
-
IEEE
-
L. Coppolino, S. D'Antonio, L. Romano, and G. Spagnuolo, "An intrusion detection system for critical information infrastructures using wireless sensor network technologies," in Critical Infrastructure (CRIS), 2010 5th International Conference on. IEEE, 2010, pp. 1-8.
-
(2010)
Critical Infrastructure (CRIS), 2010 5th International Conference on
, pp. 1-8
-
-
Coppolino, L.1
D'Antonio, S.2
Romano, L.3
Spagnuolo, G.4
-
17
-
-
79960393793
-
A hybrid intrusion detection system of cluster-based wireless sensor networks
-
K. Yan, S. Wang, and C. Liu, "A hybrid intrusion detection system of cluster-based wireless sensor networks," Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, pp. 18-20, 2009.
-
(2009)
Proceedings of the International MultiConference of Engineers and Computer Scientists
, vol.1
, pp. 18-20
-
-
Yan, K.1
Wang, S.2
Liu, C.3
-
18
-
-
38049159855
-
Hybrid intrusion detection system for wireless sensor networks
-
Springer-Verlag
-
T. H. Hai, F. Khan, and E. N. Huh, "Hybrid intrusion detection system for wireless sensor networks," in Proceedings of the 2007 international conference on Computational science and Its applications-Volume Part II. Springer-Verlag, 2007, pp. 383-396.
-
(2007)
Proceedings of the 2007 International Conference on Computational Science and Its Applications-Volume Part II
, pp. 383-396
-
-
Hai, T.H.1
Khan, F.2
Huh, E.N.3
-
19
-
-
70349636283
-
Reputation and trust-based systems for ad hoc and sensor networks
-
A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei, "Reputation and trust-based systems for ad hoc and sensor networks," Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks, 2006.
-
(2006)
Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks
-
-
Srinivasan, A.1
Teitelbaum, J.2
Liang, H.3
Wu, J.4
Cardei, M.5
-
20
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 4, no. 3, p. 15, 2008.
-
(2008)
ACM Transactions on Sensor Networks (TOSN)
, vol.4
, Issue.3
, pp. 15
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
21
-
-
36949013183
-
Drbts: Distributed reputation-based beacon trust system
-
IEEE
-
A. Srinivasan, J. Teitelbaum, and J. Wu, "Drbts: Distributed reputation-based beacon trust system," in Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on. IEEE, 2006, pp. 277-283.
-
(2006)
Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
22
-
-
78349243947
-
Extended watchdog mechanism for wireless sensor networks
-
L. Huang and L. Liu, "Extended watchdog mechanism for wireless sensor networks," Journal of Information and Computing Science, vol. 3, no. 1, pp. 39-48, 2008.
-
(2008)
Journal of Information and Computing Science
, vol.3
, Issue.1
, pp. 39-48
-
-
Huang, L.1
Liu, L.2
|