-
1
-
-
58649103569
-
Distributed intrusion detection for mobile ad hoc networks
-
2-s2.0-58649103569 10.1016/S1004-4132(08)60163-2
-
Ping Y., Xinghao J., Yue W., Ning L., Distributed intrusion detection for mobile ad hoc networks. Journal of Systems Engineering and Electronics 2008 19 4 851 859 2-s2.0-58649103569 10.1016/S1004-4132(08)60163-2
-
(2008)
Journal of Systems Engineering and Electronics
, vol.19
, Issue.4
, pp. 851-859
-
-
Ping, Y.1
Xinghao, J.2
Yue, W.3
Ning, L.4
-
3
-
-
78649494711
-
Framework for intrusion detection in IEEE 802.11 wireless mesh networks
-
2-s2.0-78649494711
-
Khan S., Loo K. K., Din Z. U., Framework for intrusion detection in IEEE 802.11 wireless mesh networks. International Arab Journal of Information Technology 2010 7 4 435 440 2-s2.0-78649494711
-
(2010)
International Arab Journal of Information Technology
, vol.7
, Issue.4
, pp. 435-440
-
-
Khan, S.1
Loo, K.K.2
Din, Z.U.3
-
4
-
-
77957862863
-
Intrusion detection in wireless mesh networks
-
New York, NY, USA CRC Press
-
Chen T. M., Kuo G.-S., Li Z.-P., Zhu G.-M., Zhang Y., Zheng J., Hu H., Intrusion detection in wireless mesh networks. Security in Wireless Mesh Networks 2007 New York, NY, USA CRC Press
-
(2007)
Security in Wireless Mesh Networks
-
-
Chen, T.M.1
Kuo, G.-S.2
Li, Z.-P.3
Zhu, G.-M.4
Zhang, Y.5
Zheng, J.6
Hu, H.7
-
7
-
-
57749194300
-
Taxonomy of security attacks in sensor networks
-
Hanoi, Vietnam
-
Roosta T., Shieh S., Sastry S., Taxonomy of security attacks in sensor networks. 1 Proceedings of the 1st IEEE International Conference on System Integration and Reliability Improvements 2006 Hanoi, Vietnam 529 536
-
(2006)
Proceedings of the 1st IEEE International Conference on System Integration and Reliability Improvements
, vol.1
, pp. 529-536
-
-
Roosta, T.1
Shieh, S.2
Sastry, S.3
-
8
-
-
84873368740
-
Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks
-
Khan S., Mast N., Loo J., Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks. Information 2009 12 1 8
-
(2009)
Information
, vol.12
, pp. 1-8
-
-
Khan, S.1
Mast, N.2
Loo, J.3
-
9
-
-
84856717994
-
Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks
-
2-s2.0-77953045295 10.1007/s11277-010-0048-y
-
Khan S., Loo J., Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications 2010 62 1 201 214 2-s2.0-77953045295 10.1007/s11277-010-0048-y
-
(2010)
Wireless Personal Communications
, vol.62
, Issue.1
, pp. 201-214
-
-
Khan, S.1
Loo, J.2
-
10
-
-
79952397095
-
Passive security threats and consequences in IEEE 802.11 wireless mesh networks
-
Khan S., Mast N., Loo K.-K., Silahuddin A., Passive security threats and consequences in IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and Its Applications 2008 2 3 4 8
-
(2008)
International Journal of Digital Content Technology and Its Applications
, vol.2
, Issue.3
, pp. 4-8
-
-
Khan, S.1
Mast, N.2
Loo, K.-K.3
Silahuddin, A.4
-
11
-
-
11144340927
-
Designing secure sensor networks
-
DOI 10.1109/MWC.2004.1368895
-
Shi E., Perrig A., Designing secure sensor networks. IEEE Wireless Communications 2004 11 6 38 43 2-s2.0-11144340927 10.1109/MWC.2004.1368895 (Pubitemid 40021188)
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
13
-
-
84878634020
-
A comparison of physical attacks on wireless sensor networks
-
10.5121/ijp2p.2011.2203
-
Mohammadi S., Jadidoleslamy H., A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks 2011 2 2 24 42 10.5121/ijp2p.2011.2203
-
(2011)
International Journal of Peer to Peer Networks
, vol.2
, Issue.2
, pp. 24-42
-
-
Mohammadi, S.1
Jadidoleslamy, H.2
-
14
-
-
0036793924
-
Denial of service in sensor networks
-
DOI 10.1109/MC.2002.1039518
-
Wood A. D., Stankovic J. A., Denial of service in sensor networks. Computer 2002 35 10 54 62 2-s2.0-0036793924 10.1109/MC.2002.1039518 (Pubitemid 35186161)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
15
-
-
84865381783
-
Enhanced clustering routing protocol for power-efficient gathering in wireless sensor network
-
10.5815/ijcnis.2012.12.02
-
Hussaini M., Bello-Salau H., Salami A., Anwar F., Abdalla A., Islam M., Enhanced clustering routing protocol for power-efficient gathering in wireless sensor network. International Journal of Communication Networks and Information Security 2012 4 18 28 10.5815/ijcnis.2012.12.02
-
(2012)
International Journal of Communication Networks and Information Security
, vol.4
, pp. 18-28
-
-
Hussaini, M.1
Bello-Salau, H.2
Salami, A.3
Anwar, F.4
Abdalla, A.5
Islam, M.6
-
16
-
-
84865350297
-
Surveying position based routing protocols for wireless sensor and ad-hoc networks
-
10.5815/ijcnis.2012.07.05
-
Popescu A., Tudorache G., Peng B., Kemp A., Surveying position based routing protocols for wireless sensor and ad-hoc networks. International Journal of Communication Networks and Information Security 2012 4 41 67 10.5815/ijcnis.2012.07.05
-
(2012)
International Journal of Communication Networks and Information Security
, vol.4
, pp. 41-67
-
-
Popescu, A.1
Tudorache, G.2
Peng, B.3
Kemp, A.4
-
19
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
Karlof C., Wagner D., Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 2003 1 2-3 293 315 2-s2.0-2942656255 10.1016/S1570-8705(03)00008-8 (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
20
-
-
77954758626
-
SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks
-
2-s2.0-77954758626 10.1007/s10922-009-9143-3
-
Khan S., Loo K.-K., Mast N., Naeem T., SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Journal of Network and Systems Management 2010 18 2 190 209 2-s2.0-77954758626 10.1007/s10922-009-9143- 3
-
(2010)
Journal of Network and Systems Management
, vol.18
, Issue.2
, pp. 190-209
-
-
Khan, S.1
Loo, K.-K.2
Mast, N.3
Naeem, T.4
-
21
-
-
84856065256
-
Secure route selection in wireless mesh networks
-
10.1016/j.comnet.2011.07.005
-
Khan S., Alrajeh N. A., Loo K.-K., Secure route selection in wireless mesh networks. Journal of Computer Networks 2012 56 2 491 503 10.1016/j.comnet.2011.07.005
-
(2012)
Journal of Computer Networks
, vol.56
, Issue.2
, pp. 491-503
-
-
Khan, S.1
Alrajeh, N.A.2
Loo, K.-K.3
-
24
-
-
66149161650
-
Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks
-
2-s2.0-66149161650 10.1016/S1353-4858(09)70053-4
-
Khan S., Loo K.-K., Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks. Network Security 2009 2009 5 9 16 2-s2.0-66149161650 10.1016/S1353-4858(09) 70053-4
-
(2009)
Network Security
, vol.2009
, Issue.5
, pp. 9-16
-
-
Khan, S.1
Loo, K.-K.2
-
26
-
-
49949111918
-
Intrusion detection of Sinkhole attacks in wireless sensor networks
-
Springer Lecture Notes in Computer Science 2-s2.0-49949111918 10.1007/978-3-540-77871-4-14
-
Krontiris I., Dimitriou T., Giannetsos T., Mpasoukos M., Intrusion detection of Sinkhole attacks in wireless sensor networks. Algorithmic Aspects of Wireless Sensor Networks ALGOSENSORS 2008 4837 Springer 150 161 Lecture Notes in Computer Science 2-s2.0-49949111918 10.1007/978-3-540-77871-4-14
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks ALGOSENSORS
, vol.4837
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
29
-
-
33750520151
-
D-SCIDS: Distributed soft computing intrusion detection system
-
DOI 10.1016/j.jnca.2005.06.001, PII S1084804505000421, Network and Information Security: A Computational Intelligence Approach
-
Abraham A., Jain R., Thomas J., Han S. Y., D-SCIDS: distributed soft computing intrusion detection system. Journal of Network and Computer Applications 2007 30 1 81 98 2-s2.0-33750520151 10.1016/j.jnca.2005.06.001 (Pubitemid 44666484)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 81-98
-
-
Abraham, A.1
Jain, R.2
Thomas, J.3
Han, S.Y.4
-
30
-
-
31144438522
-
Decentralized intrusion detection in wireless sensor networks
-
October 2005 Montreal, Canada 2-s2.0-32144435943 10.1145/1089761.1089765
-
Da Silva A. P. R., Loureiro A. A. F., Martins M. H. T., Ruiz L. B., Rocha B. P. S., Wong H. C., Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet '05) October 2005 Montreal, Canada 16 23 2-s2.0-32144435943 10.1145/1089761.1089765
-
Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet '05)
, pp. 16-23
-
-
Da Silva, A.P.R.1
Loureiro, A.A.F.2
Martins, M.H.T.3
Ruiz, L.B.4
Rocha, B.P.S.5
Wong, H.C.6
-
33
-
-
84869405244
-
Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches
-
Islam M. S., Rahman S. A., Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches. International Journal of Advanced Sciences and Technology 2011 36 1 8
-
(2011)
International Journal of Advanced Sciences and Technology
, vol.36
, pp. 1-8
-
-
Islam, M.S.1
Rahman, S.A.2
-
35
-
-
32344436245
-
Anomaly intrusion detection in wireless sensor networks
-
Trusted Internet Workshop (TIW) 2004
-
Bhuse V., Gupta A., Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006 15 1 33 51 2-s2.0-32344436245 (Pubitemid 43221071)
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.1
, pp. 33-51
-
-
Bhuse, V.1
Gupta, A.2
-
36
-
-
35348928856
-
Intrusion detection for routing attacks in sensor networks
-
2-s2.0-35348928856 10.1080/15501320600692044
-
Loo C. E., Ng M. Y., Leckie C., Palaniswami M., Intrusion detection for routing attacks in sensor networks. International Journal of Distributed Sensor Networks 2006 2 4 313 332 2-s2.0-35348928856 10.1080/15501320600692044
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.4
, pp. 313-332
-
-
Loo, C.E.1
Ng, M.Y.2
Leckie, C.3
Palaniswami, M.4
-
42
-
-
84878641590
-
The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network
-
10.5121/ijcses.2012.3204
-
Bhatnagar R., Shankar U., The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. International Journal of Computer Science & Engineering Survey 2012 3 2 31 38 10.5121/ijcses.2012. 3204
-
(2012)
International Journal of Computer Science & Engineering Survey
, vol.3
, Issue.2
, pp. 31-38
-
-
Bhatnagar, R.1
Shankar, U.2
-
44
-
-
77958590136
-
Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network
-
July 2010 Chengdu, China 2-s2.0-77958590136 10.1109/ICCSIT.2010.5563886
-
Yan K. Q., Wang S. C., Wang S. S., Liu C. W., Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network. Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT '10) July 2010 Chengdu, China 114 118 2-s2.0-77958590136 10.1109/ICCSIT.2010.5563886
-
Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT '10)
, pp. 114-118
-
-
Yan, K.Q.1
Wang, S.C.2
Wang, S.S.3
Liu, C.W.4
-
45
-
-
38049159855
-
Hybrid intrusion detection system for wireless sensor networks
-
Berlin, Germany Springer Lecture Notes in Computer Science 2-s2.0-38049159855
-
Hai T. H., Khan F., Huh E. N., Hybrid intrusion detection system for wireless sensor networks. Computational Science and Its Applications-ICCSA 2007 2007 4706 Berlin, Germany Springer 383 396 Lecture Notes in Computer Science 2-s2.0-38049159855
-
(2007)
Computational Science and Its Applications - ICCSA 2007
, vol.4706
, pp. 383-396
-
-
Hai, T.H.1
Khan, F.2
Huh, E.N.3
|