메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2326-2330

Anomaly detection and localization in UWB wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; ANOMALY-DETECTION ALGORITHMS; CLUSTER FORMATIONS; RESEARCH COMMUNITIES; ULTRA-LOW POWER CONSUMPTION; ULTRA-WIDEBAND TECHNOLOGY; WIRELESS CONNECTIVITIES; WIRELESS SENSOR NETWORK (WSNS);

EID: 84893251349     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2013.6666533     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 3
    • 73349090552 scopus 로고    scopus 로고
    • Intrusion detection systems for wireless sensor networks: A survey
    • Springer
    • A. Farooqi and F. Khan, "Intrusion Detection Systems for Wireless Sensor Networks: A Survey," in Communication and Networking. Springer, 2009, vol. 56, pp. 234-241.
    • (2009) Communication and Networking , vol.56 , pp. 234-241
    • Farooqi, A.1    Khan, F.2
  • 4
    • 79956116601 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks: A survey
    • Jul
    • M. Xie, S. Han, B. Tian, and S. Parvin, "Anomaly detection in wireless sensor networks: A survey," J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1302-1325, Jul. 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.4 , pp. 1302-1325
    • Xie, M.1    Han, S.2    Tian, B.3    Parvin, S.4
  • 7
    • 64749090866 scopus 로고    scopus 로고
    • Intrusion detection for wireless sensor networks based on multi-agent and refined clustering
    • H. bin Wang, Z. Yuan, and C. dong Wang, "Intrusion Detection for Wireless Sensor Networks based on Multi-agent and Refined Clustering," in CMC '09. International Conference, vol. 3, 2009, pp. 450-454.
    • (2009) CMC '09. International Conference , vol.3 , pp. 450-454
    • Bin Wang, H.1    Yuan, Z.2    Dong Wang, C.3
  • 12
    • 79955480673 scopus 로고    scopus 로고
    • Distance bounding with IEEE 802.15.4a: Attacks and countermeasures
    • M. Poturalski and et al., "Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures," IEEE Transactions on Wireless Communications, vol. 10, no. 4, pp. 1334-1344, 2011.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.4 , pp. 1334-1344
    • Poturalski, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.