-
1
-
-
18844454790
-
Intrusion detection in sensor networks: A noncooperative game approach
-
30 Aug.-1 Sept., IEEE Xolore Press DOI: 10.1109/NCA.2004.1347798
-
Agah, A., S.K. Das, K. Basu and M. Asadi, 2004. Intrusion detection in sensor networks: A noncooperative game approach. Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 30 Aug.-1 Sept., IEEE Xolore Press, pp: 343-346. DOI: 10.1109/NCA.2004.1347798
-
(2004)
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
2
-
-
13944283393
-
A survey on routing protocols for wireless sensor networks
-
Akkaya, K. and M. Younis, 2005. A survey on routing protocols for wireless sensor networks, Ad Hoc Netw., 3: 325-349.
-
(2005)
Ad Hoc Netw.
, vol.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.2
-
3
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI: 10.1016/S1389-1286(01)00302-4
-
Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Netw., 38: 393-422. DOI: 10.1016/S1389-1286(01)00302-4
-
(2002)
Comput. Netw.
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
DOI: 10.1109/MWC.2004.1368893
-
Al-Karaki, J.N. and A.E. Kamal, 2004. Routing techniques in wireless sensor networks: A survey, IEEE Wireless Commun., 11: 6-28. DOI: 10.1109/MWC.2004.1368893
-
(2004)
IEEE Wireless Commun.
, vol.11
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
6
-
-
78751642052
-
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
-
DOI: 10.1016/j.comcom.2010.04.008
-
Baig, Z.A., 2011. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Comput. Commun., 34: 468-484. DOI: 10.1016/j.comcom.2010.04.008
-
(2011)
Comput. Commun.
, vol.34
, pp. 468-484
-
-
Baig, Z.A.1
-
7
-
-
33846973685
-
IDEAS: Intrusion detection based on emotional ants for sensors
-
Sept. 8-10, IEEE Xpore Press DOI: 10.1109/ISDA.2005.53
-
Banerjee, S., C. Grosan and A. Abraham, 2005. IDEAS: Intrusion detection based on emotional ants for sensors. Proceedings of the 5th International Conference on Intelligent Systems Design and Applications, Sept. 8-10, IEEE Xpore Press, pp: 344-349. DOI: 10.1109/ISDA.2005.53
-
(2005)
Proceedings of the 5th International Conference on Intelligent Systems Design and Applications
, pp. 344-349
-
-
Banerjee, S.1
Grosan, C.2
Abraham, A.3
-
8
-
-
33745736659
-
Statistical Wormhole Detection in Sensor Networks
-
In: Molva, R., G. Tsudik and D. Westhoff (Eds.). Springer Berlin/Heidelberg
-
Buttyán, L., L. Dóra and I. Vajda, 2005. Statistical Wormhole Detection in Sensor Networks. In: Security and Privacy in Ad-hoc and Sensor Networks, Molva, R., G. Tsudik and D. Westhoff (Eds.). Springer Berlin/Heidelberg, pp: 128-141.
-
(2005)
Security and Privacy in Ad-hoc and Sensor Networks
, pp. 128-141
-
-
Buttyán, L.1
Dóra, L.2
Vajda, I.3
-
10
-
-
67650844989
-
Sensor network security: A survey
-
DOI: 10.1109/SURV.2009.090205
-
Chen, X., K. Makki, K. Yen and N. Pissinou, 2009. Sensor network security: A survey. IEEE Commun. Surveys Tutorials, 11: 52-73. DOI: 10.1109/SURV.2009.090205
-
(2009)
IEEE Commun. Surveys Tutorials
, vol.11
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
11
-
-
33750559564
-
Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks
-
(FSKD' 26), Springer-Verlag Berlin, Heidelberg DOI: 10.1007/11881599_88
-
Chi, S.H. and T.H. Cho, 2006. Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. Proceedings of the 3rd International Conference on Fuzzy Systems and Knowledge Discovery, (FSKD' 26), Springer-Verlag Berlin, Heidelberg, pp: 725-734. DOI: 10.1007/11881599_88
-
(2006)
Proceedings of the 3rd International Conference on Fuzzy Systems and Knowledge Discovery
, pp. 725-734
-
-
Chi, S.H.1
Cho, T.H.2
-
12
-
-
84925443479
-
Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives
-
DOI: 10.3390/fi2020096
-
Christin, D., P.S. Mogre and M. Hollick, 2010. Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives. Future Internet, 2: 96-125. DOI: 10.3390/fi2020096
-
(2010)
Future Internet
, vol.2
, pp. 96-125
-
-
Christin, D.1
Mogre, P.S.2
Hollick, M.3
-
13
-
-
47049129658
-
Malicious node detection in wireless sensor networks using an autoregression technique
-
IEEE Computer Society, June 19-25, IEEE Xplore Press, Athens DOI: 10.1109/ICNS.2007.79
-
Curiac, D.I., O. Banias, F. Dragan, C. Volosencu and O. Dranga, 2007. Malicious node detection in wireless sensor networks using an autoregression technique. Proceedings of the 3rd International Conference on Networking and Services, IEEE Computer Society, June 19-25, IEEE Xplore Press, Athens, pp: 83. DOI: 10.1109/ICNS.2007.79
-
(2007)
Proceedings of the 3rd International Conference on Networking and Services
, pp. 83
-
-
Curiac, D.I.1
Banias, O.2
Dragan, F.3
Volosencu, C.4
Dranga, O.5
-
14
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., M. Dacier and A. Wespi, 1999. Towards a taxonomy of intrusion-detection systems. Comput. Netw., 31: 805-822.
-
(1999)
Comput. Netw.
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
15
-
-
3142684688
-
Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
-
Oct. 13-16, IEEE Xplore Press DOI: 10.1109/MILCOM.2003.1290173
-
Doumit, S.S. and D.P. Agrawal, 2003. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. Proceedings of the Conference on IEEE Military Communications, Oct. 13-16, IEEE Xplore Press, pp: 609-614. DOI: 10.1109/MILCOM.2003.1290173
-
(2003)
Proceedings of the Conference on IEEE Military Communications
, pp. 609-614
-
-
Doumit, S.S.1
Agrawal, D.P.2
-
16
-
-
73349090552
-
Intrusion detection systems for wireless sensor networks: A survey
-
DOI: 10.1007/978-3-642-10844-0_29
-
Farooqi, A.H. and F.A. Khan, 2009. Intrusion detection systems for wireless sensor networks: A survey. Commun. Comput. Inform. Sci., 56: 234-241. DOI: 10.1007/978-3-642-10844-0_29
-
(2009)
Commun. Comput. Inform. Sci.
, vol.56
, pp. 234-241
-
-
Farooqi, A.H.1
Khan, F.A.2
-
18
-
-
64749090866
-
Intrusion detection for wireless sensor networks based on multi-agent and refined clustering
-
WRI, Jan. 6-8, IEEE Xplore Press, Yunnan DOI: 10.1109/CMC.2009.172
-
Huai-Bin, W., Y. Zheng and W. Chun-Dong, 2009. Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. Proceedings of the International Conference on Communications and Mobile Computing, WRI, Jan. 6-8, IEEE Xplore Press, Yunnan, pp: 450-454. DOI: 10.1109/CMC.2009.172
-
(2009)
Proceedings of the International Conference on Communications and Mobile Computing
, pp. 450-454
-
-
Huai-Bin, W.1
Zheng, Y.2
Chun-Dong, W.3
-
19
-
-
84867606395
-
An Ant based framework for preventing DDoS attack in wireless sensor networks
-
Juneja, D. and N. Arora, 2010. An Ant based framework for preventing DDoS attack in wireless sensor networks. Int. J. Adv. Technol., 1: 1-11.
-
(2010)
Int. J. Adv. Technol.
, vol.1
, pp. 1-11
-
-
Juneja, D.1
Arora, N.2
-
20
-
-
79952905718
-
Design and implementation of EAR algorithm for detecting routing attacks in WSN
-
Juneja, D., S. Bansal, G. Kaur and N. Arora, 2010. Design and implementation of EAR algorithm for detecting routing attacks in WSN. Int. J. Eng. Sci. Technol., 2: 1677-1683.
-
(2010)
Int. J. Eng. Sci. Technol.
, vol.2
, pp. 1677-1683
-
-
Juneja, D.1
Bansal, S.2
Kaur, G.3
Arora, N.4
-
21
-
-
51349133681
-
Detecting selective forwarding attacks in wireless sensor networks using support vector machines
-
Sensor Networks and Information Dec. 3-6, IEEE Xplore Press, Melbourne, Qld. DOI: 10.1109/ISSNIP.2007.4496866
-
Kaplantzis, S., A. Shilton, N. Mani and Y.A. Sekercioglu, 2007. Detecting selective forwarding attacks in wireless sensor networks using support vector machines. Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Dec. 3-6, IEEE Xplore Press, Melbourne, Qld., pp: 335-340. DOI: 10.1109/ISSNIP.2007.4496866
-
(2007)
Proceedings of the 3rd International Conference on Intelligent Sensors
, pp. 335-340
-
-
Kaplantzis, S.1
Shilton, A.2
Mani, N.3
Sekercioglu, Y.A.4
-
23
-
-
70449485122
-
Reduced complexity intrusion detection in sensor networks using genetic algorithm
-
Jun. 14-18, IEEE Xplore Press, Dresden DOI: 10.1109/ICC.2009.5199399
-
Khanna, R., L. Huaping and C. Hsiao-Hwa, 2009. Reduced complexity intrusion detection in sensor networks using genetic algorithm. Proceedings of the IEEE International Conference on Communications, Jun. 14-18, IEEE Xplore Press, Dresden, pp: 1-5. DOI: 10.1109/ICC.2009.5199399
-
(2009)
Proceedings of the IEEE International Conference on Communications
, pp. 1-5
-
-
Khanna, R.1
Huaping, L.2
Hsiao-Hwa, C.3
-
24
-
-
79551626667
-
-
PhD dissertation, in, University of Mannheim, Mannheim, Germany
-
Krontiris, I., 2008. Intrusion Prevention and Detection in Wireless Sensor Networks, PhD dissertation, in, University of Mannheim, Mannheim, Germany
-
(2008)
Intrusion Prevention and Detection in Wireless Sensor Networks
-
-
Krontiris, I.1
-
26
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
(AAWSN' 28), Springer-Verlag Berlin, Heidelberg
-
Krontiris, I., T. Dimitriou, T. Giannetsos and M. Mpasoukos, 2008. Intrusion detection of sinkhole attacks in wireless sensor networks. Proceedings of the 3rd International Conference on Algorithmic Aspects of Wireless Sensor Networks, (AAWSN' 28), Springer-Verlag Berlin, Heidelberg, pp: 150-161.
-
(2008)
Proceedings of the 3rd International Conference on Algorithmic Aspects of Wireless Sensor Networks
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
27
-
-
78751692255
-
A new collaborative approach for intrusion detection system on wireless sensor networks
-
Netw. DOI: 10.1007/978-90-481-3662-9_41
-
Lemos, M.V.D.S., L.B. Leal and R.H. Filho, 2010. A new collaborative approach for intrusion detection system on wireless sensor networks. Novel Algorithms Techniques Telecommun. Netw. DOI: 10.1007/978-90-481-3662-9_41
-
(2010)
Novel Algorithms Techniques Telecommun.
-
-
Lemos, M.V.D.S.1
Leal, L.B.2
Filho, R.H.3
-
28
-
-
56949096891
-
Group-based intrusion detection system in wireless sensor networks
-
DOI: 10.1016/j.comcom.2008.06.020
-
Li, G., J. He and Y. Fu, 2008. Group-based intrusion detection system in wireless sensor networks. Comput. Commun., 31: 4324-4332. DOI: 10.1016/j.comcom.2008.06.020
-
(2008)
Comput. Commun.
, vol.31
, pp. 4324-4332
-
-
Li, G.1
He, J.2
Fu, Y.3
-
29
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
DOI: 10.1080/15501320600692044
-
Loo, C., M. Ng, C. Leckie and M. Palaniswami, 2006. Intrusion detection for routing attacks in sensor networks. Int. J. Distributed Sensor Netw., 2: 313-332. DOI: 10.1080/15501320600692044
-
(2006)
Int. J. Distributed Sensor Netw.
, vol.2
, pp. 313-332
-
-
Loo, C.1
Ng, M.2
Leckie, C.3
Palaniswami, M.4
-
30
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
May 8-11, IEEE Xplore Press DOI: 10.1109/SP.2005.7
-
McCune, J.M., E. Shi, A. Perrig and M.K. Reiter, 2005. Detection of denial-of-message attacks on sensor network broadcasts. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, IEEE Xplore Press, pp: 64-78. DOI: 10.1109/SP.2005.7
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
-
31
-
-
84856640682
-
Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks
-
Moon, S.Y. and T.H. Cho, 2009. Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. Int. J. Comput. Sci. Netw. Security, 9: 118-122.
-
(2009)
Int. J. Comput. Sci. Netw. Security
, vol.9
, pp. 118-122
-
-
Moon, S.Y.1
Cho, T.H.2
-
32
-
-
77953860661
-
An intrusion detection framework for sensor networks using ant colony
-
IEEE Xplore Press, Pacific Grove, California, USA DOI: 10.1109/ACSSC.2009.5470103
-
Muraleedharan, R. and L.A. Osadciw, 2009. An intrusion detection framework for sensor networks using ant colony. Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers, IEEE Xplore Press, Pacific Grove, California, USA, pp: 275-278. DOI: 10.1109/ACSSC.2009.5470103
-
(2009)
Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers
, pp. 275-278
-
-
Muraleedharan, R.1
Osadciw, L.A.2
-
33
-
-
0042474230
-
Detecting network intrusions via sampling: A game theoretic approach
-
IEEE Societies, Mar. 30-Apr. 3, IEEE Xplore Press DOI: 10.1109/INFCOM.2003.1209210
-
Murali, K. and T.V. Lakshman, 2003. Detecting network intrusions via sampling: a game theoretic approach. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, Mar. 30-Apr. 3, IEEE Xplore Press, pp: 1880-1889. DOI: 10.1109/INFCOM.2003.1209210
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications.
, pp. 1880-1889
-
-
Murali, K.1
Lakshman, T.V.2
-
34
-
-
33747302351
-
An intrusion detection system for wireless sensor networks
-
Networking And Communications, Aug. 22-24, IEEE Xplore Press DOI: 10.1109/WIMOB.2005.1512911
-
Onat, I. and A. Miri, 2005. An intrusion detection system for wireless sensor networks. Proceedings of the IEEE International Conference on, Wireless And Mobile Computing, Networking And Communications, Aug. 22-24, IEEE Xplore Press, pp: 253-259. DOI: 10.1109/WIMOB.2005.1512911
-
(2005)
Proceedings of the IEEE International Conference on, Wireless And Mobile Computing
, pp. 253-259
-
-
Onat, I.1
Miri, A.2
-
35
-
-
33745917688
-
An Anomaly detection algorithm for detecting attacks in wireless sensor networks
-
(ISI' 06), Springer-Verlag Berlin, Heidelberg DOI: 10.1007/11760146_111
-
Phuong, T.V., L. Hung, S. Cho, Y.K. Lee and S. Lee, 2006. An Anomaly detection algorithm for detecting attacks in wireless sensor networks. Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics, (ISI' 06), Springer-Verlag Berlin, Heidelberg, pp: 735-736. DOI: 10.1007/11760146_111
-
(2006)
Proceedings of the 4th IEEE International Conference on Intelligence and Security Informatics
, pp. 735-736
-
-
Phuong, T.V.1
Hung, L.2
Cho, S.3
Lee, Y.K.4
Lee, S.5
-
36
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
(PDS' 04)
-
Pires, W.R., T.H. De Paula Figueiredo, H.C. Wong and A.A.F. Loureiro, 2004. Malicious node detection in wireless sensor networks. Proceedings. 18th International, Parallel and Distributed Processing Symposium, (PDS' 04), pp: 1-7.
-
(2004)
Proceedings. 18th International, Parallel and Distributed Processing Symposium
, pp. 1-7
-
-
Pires, W.R.1
De Paula Figueiredo, T.H.2
Wong, H.C.3
Loureiro, A.A.F.4
-
37
-
-
84856665180
-
Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
-
Ponomarchuk, Y.A. and Seo D.W., 2010. Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J. Convergence, 1: 35-42.
-
(2010)
J. Convergence
, vol.1
, pp. 35-42
-
-
Ponomarchuk, Y.A.1
Seo, D.W.2
-
38
-
-
49749114376
-
Anomaly detection in wireless sensor networks
-
DOI: 10.1109/MWC.2008.4599219
-
Rajasegarar, S., C. Leckie and M. Palaniswami, 2008. Anomaly detection in wireless sensor networks. IEEE Wireless Commun., 15: 34-40. DOI: 10.1109/MWC.2008.4599219
-
(2008)
IEEE Wireless Commun.
, vol.15
, pp. 34-40
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
-
39
-
-
38549109147
-
Quarter sphere based distributed anomaly detection in wireless sensor networks
-
June 24-28, IEEE Xplore Press, Glasgow DOI: 10.1109/ICC.2007.637
-
Rajasegarar, S., C. Leckie, M. Palaniswami and J.C. Bezdek, 2007. Quarter sphere based distributed anomaly detection in wireless sensor networks. Proceedings of the IEEE International Conference on Communications, June 24-28, IEEE Xplore Press, Glasgow, pp: 3864-3869. DOI: 10.1109/ICC.2007.637
-
(2007)
Proceedings of the IEEE International Conference on Communications
, pp. 3864-3869
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
Bezdek, J.C.4
-
40
-
-
79955681745
-
Game theory model for selective forward attacks in wireless sensor networks
-
Jun. 24-26, IEEE Xplore Press, Thessaloniki DOI: 10.1109/MED.2009.5164584
-
Reddy, Y.B. and S. Srivathsan, 2009. Game theory model for selective forward attacks in wireless sensor networks, Proceedings of the 17th Mediterranean Conference on Control and Automation, Jun. 24-26, IEEE Xplore Press, Thessaloniki, pp: 458-463. DOI: 10.1109/MED.2009.5164584
-
(2009)
Proceedings of the 17th Mediterranean Conference on Control and Automation
, pp. 458-463
-
-
Reddy, Y.B.1
Srivathsan, S.2
-
41
-
-
11144340927
-
Designing secure sensor networks
-
DOI: 10.1109/MWC.2004.1368895 Silva, A.P.R.D., M.H.T. Martins, B.P.S. Rocha, A.A.F
-
Shi, E. and A. Perrig, 2006. Designing secure sensor networks. IEEE Wireless Commun., 11: 38-43. DOI: 10.1109/MWC.2004.1368895 Silva, A.P.R.D., M.H.T. Martins, B.P.S. Rocha, A.A.F.
-
(2006)
IEEE Wireless Commun.
, vol.11
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
43
-
-
79952060290
-
Neighbor-based intrusion detection for wireless sensor networks
-
(ICWMC), Sept. 20-25, IEEE Xplore Press, Valencia DOI: 10.1109/ICWMC.2010.61
-
Stetsko, A., L. Folkman and V. Matyáš, 2010. Neighbor-based intrusion detection for wireless sensor networks. Proceedings of the 6th International Conference on Wireless and Mobile Communications (ICWMC), Sept. 20-25, IEEE Xplore Press, Valencia, pp: 420-425. DOI: 10.1109/ICWMC.2010.61
-
(2010)
Proceedings of the 6th International Conference on Wireless and Mobile Communications
, pp. 420-425
-
-
Stetsko, A.1
Folkman, L.2
Matyáš, V.3
-
44
-
-
25144439604
-
-
1st Edn., Pearson Education India, ISBN-10: 8131714721
-
Tan, P.N., 2007. Introduction To Data Mining. 1st Edn., Pearson Education India, ISBN-10: 8131714721, pp: 792.
-
(2007)
Introduction To Data Mining
, pp. 792
-
-
Tan, P.N.1
-
46
-
-
80052033497
-
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks, Expert Syst
-
DOI: 10.1016/j.eswa.2011.05.076
-
Wang, S.S., K.Q. Yan, S.C. Wang and C.W. Liu, 2011. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks, Expert Syst. Appli., 38: 15234-15243. DOI: 10.1016/j.eswa.2011.05.076
-
(2011)
Appli.
, vol.38
, pp. 15234-15243
-
-
Wang, S.S.1
Yan, K.Q.2
Wang, S.C.3
Liu, C.W.4
-
47
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
DOI: 10.1109/COMST.2006.315852
-
Wang, Y., G. Attebury and B. Ramamurthy, 2006. A survey of security issues in wireless sensor networks. IEEE Commun. Surveys Tutorials, 8: 2-23. DOI: 10.1109/COMST.2006.315852
-
(2006)
IEEE Commun. Surveys Tutorials
, vol.8
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
48
-
-
79956116601
-
Anomaly detection in wireless sensor networks: A survey
-
DOI: 10.1016/j.jnca.2011.03.004
-
Xie, M., S. Han, B. Tian and S. Parvin, 2011. Anomaly detection in wireless sensor networks: A survey. J. Network Comput. Appli., 34: 1302-1325. DOI: 10.1016/j.jnca.2011.03.004
-
(2011)
J. Network Comput. Appli.
, vol.34
, pp. 1302-1325
-
-
Xie, M.1
Han, S.2
Tian, B.3
Parvin, S.4
-
49
-
-
77955082590
-
Outlier detection techniques for wireless sensor networks: A survey
-
DOI: 10.1109/SURV.2010.021510.00088
-
Yang, Z., N. Meratnia and P. Havinga, 2010. Outlier detection techniques for wireless sensor networks: A survey. IEEE Commun. Surveys Tutorials, 12: 159-170. DOI: 10.1109/SURV.2010.021510.00088
-
(2010)
IEEE Commun. Surveys Tutorials
, vol.12
, pp. 159-170
-
-
Yang, Z.1
Meratnia, N.2
Havinga, P.3
-
50
-
-
46449122114
-
Wireless sensor network survey
-
DOI: 10.1016/j.comnet.2008.04.002
-
Yick, J., B. Mukherjee and D. Ghosal, 2008. Wireless sensor network survey. Comput. Netw., 52: 2292-2330. DOI: 10.1016/j.comnet.2008.04.002
-
(2008)
Comput. Netw.
, vol.52
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
51
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
DOI: 10.1109/COMST.2008.4625802
-
Yun, Z., F. Yuguang and Z. Yanchao, 2008. Securing wireless sensor networks: A survey. IEEE Commun. Surveys Tutorials, 10: 6-28. DOI: 10.1109/COMST.2008.4625802
-
(2008)
IEEE Commun. Surveys Tutorials
, vol.10
, pp. 6-28
-
-
Yun, Z.1
Yuguang, F.2
Yanchao, Z.3
-
53
-
-
70350130114
-
Adaptive and online one-class support vector machine-based outlier detection techniques for wireless sensor networks
-
May 26-29, IEEE Xplore Press, Bradford DOI: 10.1109/WAINA.2009.200
-
Zhang, Y., N. Meratnia and P. Havinga, 2009. Adaptive and online one-class support vector machine-based outlier detection techniques for wireless sensor networks. Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications Workshops/Symposia, May 26-29, IEEE Xplore Press, Bradford, pp: 990-995. DOI: 10.1109/WAINA.2009.200
-
(2009)
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications Workshops/Symposia
, pp. 990-995
-
-
Zhang, Y.1
Meratnia, N.2
Havinga, P.3
|