-
1
-
-
79956116601
-
Anomaly detection in wireless sensor networks: A survey
-
July
-
M. Xie, S. Han, B. Tian, and S. Parvin, "Anomaly detection in wireless sensor networks: A survey," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1302-1325, July 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1302-1325
-
-
Xie, M.1
Han, S.2
Tian, B.3
Parvin, S.4
-
2
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
A. P. R. d. Silva, M. H. Martins, B. P. Rocha, A. A. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, 2005.
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
-
Silva, A.P.R.D.1
Martins, M.H.2
Rocha, B.P.3
Loureiro, A.A.4
Ruiz, L.B.5
Wong, H.C.6
-
3
-
-
77955684744
-
Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks
-
Sept
-
S. Rajasegarar, C. Leckie, J. C. Bezdek, and M. Palaniswami, "Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks," IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 518-533, Sept 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.3
, pp. 518-533
-
-
Rajasegarar, S.1
Leckie, C.2
Bezdek, J.C.3
Palaniswami, M.4
-
4
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
C. E. Loo, M. Y. Ng, C. Leckie, and M. Palaniswami, "Intrusion detection for routing attacks in sensor networks," International Journal of Distributed Sensor Networks, vol. 2, no. 4, pp. 313-332, 2006.
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.4
, pp. 313-332
-
-
Loo, C.E.1
Ng, M.Y.2
Leckie, C.3
Palaniswami, M.4
-
5
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in Proceedings of the 26th IEEE International Conference on Computer Communications, May 2007, pp. 1937-1945.
-
Proceedings of the 26th IEEE International Conference on Computer Communications, May 2007
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
6
-
-
14344259796
-
Distributed deviation detection in sensor networks
-
Dec
-
T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Distributed deviation detection in sensor networks," SIGMOD Record, vol. 32, no. 4, pp. 77-82, Dec 2003.
-
(2003)
SIGMOD Record
, vol.32
, Issue.4
, pp. 77-82
-
-
Palpanas, T.1
Papadopoulos, D.2
Kalogeraki, V.3
Gunopulos, D.4
-
7
-
-
35248830261
-
Online outlier detection in sensor data using nonparametric models
-
S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Online outlier detection in sensor data using nonparametric models," in Proceedings of the 32nd international conference on Very large data bases, Sept 2006.
-
Proceedings of the 32nd International Conference on Very Large Data Bases, Sept 2006
-
-
Subramaniam, S.1
Palpanas, T.2
Papadopoulos, D.3
Kalogeraki, V.4
Gunopulos, D.5
-
8
-
-
81555199703
-
Anomaly detection in information streams without prior domain knowledge
-
Oct
-
M. S. Beigi, S.-F. Chang, S. Ebadollahi, and D. C. Verma, "Anomaly detection in information streams without prior domain knowledge," IBM Journal of Research and Development, vol. 55, no. 5, pp. 11:1-11:11, Oct 2011.
-
(2011)
IBM Journal of Research and Development
, vol.55
, Issue.5
-
-
Beigi, M.S.1
Chang, S.-F.2
Ebadollahi, S.3
Verma, D.C.4
-
9
-
-
37849053357
-
Outlier detection in sensor networks
-
B. Sheng, Q. Li, W. Mao, and W. Jin, "Outlier detection in sensor networks," in Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, 2007.
-
(2007)
Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
Jin, W.4
-
10
-
-
80053412531
-
Distance-based outlier detection: Consolidation and renewed bearing
-
Spet
-
G. H. Orair, C. H. C. Teixeira, W. M. Jr., Y. Wang, and S. Parthasarathy, "Distance-based outlier detection: Consolidation and renewed bearing," Proceedings of the VLDB Endowment, vol. 3, no. 1-2, pp. 1469-1480, Spet 2010.
-
(2010)
Proceedings of the VLDB Endowment
, vol.3
, Issue.1-2
, pp. 1469-1480
-
-
Orair, G.H.1
Teixeira, C.H.C.2
M Jr., W.3
Wang, Y.4
Parthasarathy, S.5
-
11
-
-
20344386428
-
On exploiting spatial and temporal correlation in wireless sensor networks
-
I. F. Akyildiz, M. C. Vuran, and O. B. Akan, "On exploiting spatial and temporal correlation in wireless sensor networks," in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2004, pp. 71-80.
-
(2004)
Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
, pp. 71-80
-
-
Akyildiz, I.F.1
Vuran, M.C.2
Akan, O.B.3
-
12
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
Dec
-
J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: A survey," IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, Dec 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.N.1
Kamal, A.E.2
-
14
-
-
84868125384
-
-
Intel Berkeley Research Lab, IBRL data
-
Intel Berkeley Research Lab, IBRL data, http://db.csail.mit.edu/labdata/ labdata.html.
-
-
-
-
15
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
November
-
X. D. Hoang, J. Hu, and P. Bertok, "A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Network and Computer Applications, vol. 32, no. 6, November 2009.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.6
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
16
-
-
65249107163
-
A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
-
Feburary
-
J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection," Special Issue of Advances on Network Intrusion Detection, IEEE Network, vol. 23, no. 1, pp. 42-47, Feburary 2009.
-
(2009)
Special Issue of Advances on Network Intrusion Detection, IEEE Network
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.-H.4
-
17
-
-
21644438395
-
An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
X. D. Hoang and J. Hu, "An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls," in Proceedings of the 12th IEEE International Conference on Networks, vol. 2, 2004, pp. 470-474.
-
(2004)
Proceedings of the 12th IEEE International Conference on Networks
, vol.2
, pp. 470-474
-
-
Hoang, X.D.1
Hu, J.2
-
18
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls," in Proceedings of the 11th IEEE International Conference on Networks, 2003, pp. 531-536.
-
(2003)
Proceedings of the 11th IEEE International Conference on Networks
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
|