-
1
-
-
57749194300
-
Taxonomy of security attacks in sensor networks. In: First
-
Hanoi, Vietnam
-
Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks. In: First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, vol. 1, pp. 529-536 (2006)
-
(2006)
IEEE International Conference on System Integration and Reliability Improvements
, vol.1
, pp. 529-536
-
-
Roosta, T.1
Shieh, S.2
Sastry, S.3
-
2
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks: The International Journal of Computer and Telecommunications Networking 31(9), 805-822 (1999)
-
(1999)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.31
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
3
-
-
0015600423
-
The viterbi algorithm
-
Forney, G.: The Viterbi Algorithm. Proc. IEEE 61(3), 268-278 (1973)
-
(1973)
Proc. IEEE
, vol.61
, Issue.3
, pp. 268-278
-
-
Forney, G.1
-
6
-
-
70249088263
-
Intrusion detection for routing attacks in sensor networks
-
Loo, C., Ng, M., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks (2005)
-
(2005)
International Journal of Distributed Sensor Networks
-
-
Loo, C.1
Ng, M.2
Leckie, C.3
Palaniswami, M.4
-
7
-
-
3142684688
-
Self organized critically and stochastic learning based intrusion detection system for wireless sensor networks
-
Doumit, S., Agrawal, D.: Self Organized Critically and Stochastic Learning Based Intrusion Detection System for Wireless Sensor Networks. In: Military Communications Conference, MILCOM (2003)
-
(2003)
Military Communications Conference, MILCOM
-
-
Doumit, S.1
Agrawal, D.2
-
9
-
-
1542284989
-
Intrusion detection based on hidden markov model
-
Yin, Q., Shen, L., Zhang, R., Li, X.,Wang, H.: Intrusion Detection Based on Hidden Markov Model. In: International Conference on Machine Learning and Cybernetics, vol. 5, pp. 3115-3118 (2003)
-
(2003)
International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 3115-3118
-
-
Yin, Q.1
Shen, L.2
Zhang, R.3
Li, X.4
Wang, H.5
-
10
-
-
34247391599
-
System approach to intrusion detection using hidden Markov model
-
DOI 10.1145/1143549.1143619, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
-
Khanna, R., Liu, H.: System Approach to Intrusion Detection Using Hidden Markov Model. In: Proceedings of the international conference on Wireless communications and mobile computing, vol. 5, pp. 349-354 (2006) (Pubitemid 46645220)
-
(2006)
IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
, vol.2006
, pp. 349-354
-
-
Khanna, R.1
Liu, H.2
-
11
-
-
27944485221
-
Distance measures for nonparametric weak process models
-
IEEE Systems, Man and Cybernetics Society, Proceedings - 2005 International Conference on Systems, Man and Cybernetics
-
Sheng, Y., Cybenko, G.: Distance Measures for Nonparametric Weak Process Models. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 722-727 (2005) (Pubitemid 41674964)
-
(2005)
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
, vol.1
, pp. 722-727
-
-
Sheng, Y.1
Cybenko, G.V.2
-
12
-
-
52149122494
-
-
Ph.D Thesis, Dartmouth College, Hanover, NH, USA
-
Giani, A.: Detection of Attacks on Cognitive Channels. Ph.D. Thesis, Dartmouth College, Hanover, NH, USA (2006)
-
(2006)
Detection of Attacks on Cognitive Channels
-
-
Giani, A.1
-
13
-
-
32144435943
-
Decentralized Intrusion Detection in wireless sensor networks
-
Silva, A., Martins, M., Rocha, B., Loureiro, A., Ruiz, L., Wong, H.: Decentralized Intrusion Detection in wireless sensor networks. In: Proceedings of the 1st ACM International Workshop on Quality of service and security in wireless and mobile Networks (2005)
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
-
Silva, A.1
Martins, M.2
Rocha, B.3
Loureiro, A.4
Ruiz, L.5
Wong, H.6
-
15
-
-
0022594196
-
An introduction to hidden markov models
-
Rabiner, L., Juang, B.: An Introduction to Hidden Markov Models. IEEE ASSP Magazine, 4-16 (1986)
-
(1986)
IEEE ASSP Magazine
, pp. 4-16
-
-
Rabiner, L.1
Juang, B.2
-
16
-
-
84885892161
-
-
http://www.tinyos.net/tinyos2.x/doc
-
-
-
-
21
-
-
49949100055
-
Internet traffic modeling by means of hidden markov models
-
Dainotti, A., Pescape, A., Rossi, P., Palmieri, F., Ventre, G.: Internet Traffic modeling by means of Hidden Markov Models. Computer Networks 54, 2645-2662 (2008)
-
(2008)
Computer Networks
, vol.54
, pp. 2645-2662
-
-
Dainotti, A.1
Pescape, A.2
Rossi, P.3
Palmieri, F.4
Ventre, G.5
-
22
-
-
34247500449
-
Efficacy of Hidden Markov Models over neural networks in anomaly intrusion detection
-
DOI 10.1109/COMPSAC.2006.40, 4020093, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006
-
Al-Subaie, M., Zulkernine, M.: Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. In: Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 325-332 (2006) (Pubitemid 46661664)
-
(2006)
Proceedings - International Computer Software and Applications Conference
, vol.1
, pp. 325-332
-
-
Al-Subaie, M.1
Zulkernine, M.2
-
23
-
-
6344239144
-
Modeling program behaviors by hidden Markov models for intrusion detection
-
Wang, W., Guan, X., Zhang, X.: Modeling program behaviors by hidden Markov models for intrusion detection. In: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, vol. 5, pp. 2830-2835 (2004)
-
(2004)
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 2830-2835
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
24
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
April
-
Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: Proceedings of the Sixth International Conference on Information Processing in Sensor Networks (IPSN) (April 2007)
-
(2007)
Proceedings of the Sixth International Conference on Information Processing in Sensor Networks (IPSN)
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
25
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of the INFOCOM 2003 (2003)
-
(2003)
Proceedings of the INFOCOM 2003
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
26
-
-
33847215147
-
How to secure a wireless sensor network
-
Law, Y., Havinga, P., Johnson, D.: How to Secure a Wireless Sensor Network. In: Proc. of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference (2005)
-
(2005)
Proc. of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference
-
-
Law, Y.1
Havinga, P.2
Johnson, D.3
-
27
-
-
42549138436
-
On the intruder detection for sinkhole attack in wireless sensor networks
-
Ngai, E., Liu, J., Lyu, M.: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In: Proc. of the IEEE International Conference on Communications, ICC 2006 (2006)
-
(2006)
Proc. of the IEEE International Conference on Communications, ICC 2006
-
-
Ngai, E.1
Liu, J.2
Lyu, M.3
-
28
-
-
73349093221
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Krontiris, I., Dimitriou, T., Giannetsos, T., Mpasoukos, M.: Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Proc. 3rd International Workshop on Algorithmic Aspects ofWireless Sensor Networks, AlgoSensors 2007 (2007)
-
(2007)
Proc. 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks, AlgoSensors 2007
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
29
-
-
48149090928
-
Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
-
Dallas, D., Leckie, C., Ramamohanarao, K.: Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. In: Proc. of the 15th IEEE International Conference on Networks, ICON 2007 (2007)
-
(2007)
Proc. of the 15th IEEE International Conference on Networks, ICon 2007
-
-
Dallas, D.1
Leckie, C.2
Ramamohanarao, K.3
-
30
-
-
34748845652
-
Topology-based clusterhead candidate selection in wireless ad-hoc and sensor networks
-
Brust, M.R., Andronache, A., Rothkugel, S., Benenson, Z.: Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks. In: 2nd International Conference on Communication Systems Software and Middleware, COMSWARE 2007, pp. 1-8 (2007)
-
(2007)
2nd International Conference on Communication Systems Software and Middleware, COMSWARE 2007
, pp. 1-8
-
-
Brust, M.R.1
Andronache, A.2
Rothkugel, S.3
Benenson, Z.4
-
31
-
-
47849086713
-
-
Tech. Report, Washington University in St. Louis, WUCSE-2006-16
-
Fok, C.-L., Roman, G.C., Lu, C.: Agilla: A Mobile Agent Middleware for Sensor Networks. Tech. Report, Washington University in St. Louis, WUCSE-2006-16 (2006)
-
(2006)
Agilla: A Mobile Agent Middleware for Sensor Networks
-
-
Fok, C.-L.1
Roman, G.C.2
Lu, C.3
-
32
-
-
84885891727
-
-
Purdue University TR 98-05
-
Balasubramainyan, J., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An architecture of Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University TR 98-05 (1998)
-
(1998)
An Architecture of Intrusion Detection Using Autonomous Agents Department of Computer Science
-
-
Balasubramainyan, J.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
35
-
-
33847258726
-
A peer-to-eer collaborative intrusion detection system
-
Zhou, C.V., Karunasekera, S., Leckie, C.: A Peer-to-eer Collaborative Intrusion Detection System. In: Proc. of 13th IEEE International Conference on Communications, ICC 2005 (2005)
-
(2005)
Proc. of 13th IEEE International Conference on Communications, ICC 2005
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
|