-
1
-
-
77249166094
-
A survey on security in wireless mesh networks
-
10.4103/0256-4602.58969 2-s2.0-77249166094
-
Yi P., Wu Y., Zou F., Liu N., A survey on security in wireless mesh networks. IETE Technical Review 2010 27 1 6 14 10.4103/0256-4602.58969 2-s2.0-77249166094
-
(2010)
IETE Technical Review
, vol.27
, Issue.1
, pp. 6-14
-
-
Yi, P.1
Wu, Y.2
Zou, F.3
Liu, N.4
-
2
-
-
33747437914
-
Flooding attack and defence in Ad hoc networks
-
DOI 10.1016/S1004-4132(06)60070-4
-
Yi P., Hou Y., Zhong Y. P., Dai Z. L., Flooding attack and defence in ad hoc networks. Journal of Systems Engineering and Electronics 2006 17 2 410 416 10.1016/S1004-4132(06)60070-4 (Pubitemid 44249053)
-
(2006)
Journal of Systems Engineering and Electronics
, vol.17
, Issue.2
, pp. 410-416
-
-
Yi, P.1
Hou, Y.2
Zhong, Y.3
Zhang, S.4
Dai, Z.5
-
3
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
DOI 10.1016/S0167-4048(02)00514-X
-
Liao Y., Vemuri V. R., Use of k-nearest neighbor classifier for intrusion detection. Computers & Security 2002 21 5 439 448 10.1016/S0167-4048(02) 00514-X 2-s2.0-0036321445 (Pubitemid 34835644)
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
6
-
-
84889031080
-
Security in wireless sensor networks: Issues and challenges
-
Ahmad Salehi S., Razzaque M. A., Naraei P., Farrokhtala A., Security in wireless sensor networks: issues and challenges. Proceedings of the IEEE International Conference on Space Science and Communication (IconSpace '13) 2013 Melaka, Malaysia 356 360
-
Proceedings of the IEEE International Conference on Space Science and Communication (IconSpace '13) 2013 Melaka, Malaysia
, pp. 356-360
-
-
Ahmad Salehi, S.1
Razzaque, M.A.2
Naraei, P.3
Farrokhtala, A.4
-
11
-
-
38549091210
-
Integration of secure in-network aggregation and system monitoring for wireless sensor networks
-
Sun B., Jin X., Wu K., Xiao Y., Integration of secure in-network aggregation and system monitoring for wireless sensor networks. Proceedings of the IEEE International Conference on Communications (ICC '07) June 2007 Glasgow, Scotland Politecnico di Milano 1466 1471 10.1109/ICC.2007.246 2-s2.0-38549091210
-
Proceedings of the IEEE International Conference on Communications (ICC '07) June 2007 Glasgow, Scotland Politecnico di Milano 10.1109/ICC.2007.246 2-s2.0-38549091210
, pp. 1466-1471
-
-
Sun, B.1
Jin, X.2
Wu, K.3
Xiao, Y.4
-
12
-
-
51649105341
-
Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach
-
10.1016/j.pmcj.2008.05.005 2-s2.0-51649105341
-
Zhang W., Liu Y., Das S. K., De P., Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach. Pervasive and Mobile Computing 2008 4 5 658 680 10.1016/j.pmcj.2008.05.005 2-s2.0-51649105341
-
(2008)
Pervasive and Mobile Computing
, vol.4
, Issue.5
, pp. 658-680
-
-
Zhang, W.1
Liu, Y.2
Das, S.K.3
De, P.4
-
15
-
-
51349135576
-
Towards a theory of robust localization against malicious beacon nodes
-
Zhong S., Jadliwala M., Upadhyaya S., Qiao C., Towards a theory of robust localization against malicious beacon nodes. Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08) April 2008 Phoenix, Ariz, USA 2065 2073 10.1109/INFOCOM.2007.197 2-s2.0-51349135576
-
Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08) April 2008 Phoenix, Ariz, USA 10.1109/INFOCOM.2007.197 2-s2.0-51349135576
, pp. 2065-2073
-
-
Zhong, S.1
Jadliwala, M.2
Upadhyaya, S.3
Qiao, C.4
-
16
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
Wenbo H. E., Liu X., Nguyen H., Nahrstedt K., Abdelzaher T., PDA: privacy-preserving data aggregation in wireless sensor networks. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07) May 2007 Anchorage, Alaska, USA 2045 2053 10.1109/INFCOM.2007.237
-
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07) May 2007 Anchorage, Alaska, USA 10.1109/INFCOM.2007.237
, pp. 2045-2053
-
-
Wenbo, H.E.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
19
-
-
0035338003
-
A new intrusion detection method based on discriminant analysis
-
High-Speed Internet Technology and its Applications
-
Asaka M., Onabuta T., Inoue T., Okazawa S., Goto S., A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems 2001 5 570 577 2-s2.0-0035338003 (Pubitemid 32486789)
-
(2001)
IEICE Transactions on Information and Systems
, vol.E84-D
, Issue.5
, pp. 570-577
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
20
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
DOI 10.1109/3468.935043, PII S1083442701052882, Information Assurance
-
Ye N., Li X., Chen Q., Emran S. M., Xu M., Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on Systems, Man and Cybernetics A: Systems and Humans 2001 31 4 266 274 10.1109/3468.935043 (Pubitemid 33142052)
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
21
-
-
84906996397
-
A denial of service attack in advanced metering infrastructure network
-
Yi P., Zhu T., Zhang Q., Wu Y., Li J. H., A denial of service attack in advanced metering infrastructure network. Proceedings of the IEEE International Conference on Communications (ICC '14) June 2014 Sydney, Australia
-
Proceedings of the IEEE International Conference on Communications (ICC '14) June 2014 Sydney, Australia
-
-
Yi, P.1
Zhu, T.2
Zhang, Q.3
Wu, Y.4
Li, J.H.5
-
22
-
-
34247465849
-
A new routing attack in mobile ad hoc
-
Yi P., Dai Z., Zhong Y., Zhang S., A new routing attack in mobile ad hoc. International Journal of Information Technology 2005 11 2 83 94
-
(2005)
International Journal of Information Technology
, vol.11
, Issue.2
, pp. 83-94
-
-
Yi, P.1
Dai, Z.2
Zhong, Y.3
Zhang, S.4
-
23
-
-
79954503285
-
Performance analysis of mobile ad hoc networks under flooding attacks
-
10.3969/j.issn.1004-4132.2011.02.022 2-s2.0-79954503285
-
Yi P., Zou F., Zou Y., Wang Z., Performance analysis of mobile ad hoc networks under flooding attacks. Journal of Systems Engineering and Electronics 2011 22 2 334 339 10.3969/j.issn.1004-4132.2011.02.022 2-s2.0-79954503285
-
(2011)
Journal of Systems Engineering and Electronics
, vol.22
, Issue.2
, pp. 334-339
-
-
Yi, P.1
Zou, F.2
Zou, Y.3
Wang, Z.4
-
24
-
-
70350586784
-
Effects of denial of service attack in mobile ad hoc networks
-
10.1007/s12204-009-0580-7 2-s2.0-70350586784
-
Yi P., Zhou Y., Wu Y., Liu N., Effects of denial of service attack in mobile ad hoc networks. Journal of Shanghai Jiaotong University (Science) 2009 14 5 580 583 10.1007/s12204-009-0580-7 2-s2.0-70350586784
-
(2009)
Journal of Shanghai Jiaotong University (Science)
, vol.14
, Issue.5
, pp. 580-583
-
-
Yi, P.1
Zhou, Y.2
Wu, Y.3
Liu, N.4
-
25
-
-
77952533096
-
Impact of two kinds of DoS attacks on mobile ad hoc networks
-
2-s2.0-77952533096
-
Yi P., Cai J., Wu Y., Li Y., Impact of two kinds of DoS attacks on mobile ad hoc networks. Journal of Computational Information Systems 2009 5 5 1433 1443 2-s2.0-77952533096
-
(2009)
Journal of Computational Information Systems
, vol.5
, Issue.5
, pp. 1433-1443
-
-
Yi, P.1
Cai, J.2
Wu, Y.3
Li, Y.4
-
26
-
-
84862652347
-
Cross-layer detection for black hole attack in wireless network
-
2-s2.0-84862652347
-
Yi P., Zhu T., Liu N., Wu Y., Li J., Cross-layer detection for black hole attack in wireless network. Journal of Computational Information Systems 2012 8 10 4101 4109 2-s2.0-84862652347
-
(2012)
Journal of Computational Information Systems
, vol.8
, Issue.10
, pp. 4101-4109
-
-
Yi, P.1
Zhu, T.2
Liu, N.3
Wu, Y.4
Li, J.5
-
27
-
-
80051939469
-
Intrusion detection for wireless mesh networks using finite state Machine
-
2-s2.0-80051939469
-
Yi P., Wu Y., Liu N., Wang Z., Intrusion detection for wireless mesh networks using finite state Machine. China Communications 2010 7 5 40 48 2-s2.0-80051939469
-
(2010)
China Communications
, vol.7
, Issue.5
, pp. 40-48
-
-
Yi, P.1
Wu, Y.2
Liu, N.3
Wang, Z.4
-
28
-
-
80051974812
-
Towards an artificial immune system for detecting anomalies in wireless mesh networks
-
2-s2.0-80051974812
-
Yi P., Wu Y., Chen J., Towards an artificial immune system for detecting anomalies in wireless mesh networks. China Communications 2011 8 3 107 117 2-s2.0-80051974812
-
(2011)
China Communications
, vol.8
, Issue.3
, pp. 107-117
-
-
Yi, P.1
Wu, Y.2
Chen, J.3
-
29
-
-
58649103569
-
Distributed intrusion detection for mobile ad hoc networks
-
10.1016/S1004-4132(08)60163-2
-
Yi P., Jiang X., Wu Y., Distributed intrusion detection for mobile ad hoc networks. Journal of Systems Engineering and Electronics 2008 19 3 851 859 10.1016/S1004-4132(08)60163-2
-
(2008)
Journal of Systems Engineering and Electronics
, vol.19
, Issue.3
, pp. 851-859
-
-
Yi, P.1
Jiang, X.2
Wu, Y.3
-
30
-
-
84875048550
-
An intrusion prevention mechanism in mobile ad hoc networks
-
2-s2.0-84875048550
-
Yi P., Zhu T., Ma J., Wu Y., An intrusion prevention mechanism in mobile ad hoc networks. Ad-Hoc & Sensor Wireless Networks 2013 17 3-4 269 292 2-s2.0-84875048550
-
(2013)
Ad-Hoc & Sensor Wireless Networks
, vol.17
, Issue.3-4
, pp. 269-292
-
-
Yi, P.1
Zhu, T.2
Ma, J.3
Wu, Y.4
-
31
-
-
40749116519
-
Mobile firewall: A framework to isolate intruders in wireless mesh networks
-
Yi P., Jiang X., Li J., Mobile firewall: a framework to isolate intruders in wireless mesh networks. Journal of Computational Information Systems 2007 3 6 2207 2218 2-s2.0-40749116519 (Pubitemid 351383174)
-
(2007)
Journal of Computational Information Systems
, vol.3
, Issue.6
, pp. 2207-2218
-
-
Yi, P.1
Jiang, X.2
Li, J.3
-
32
-
-
37549019694
-
Multi-agent cooperative intrusion response in mobile adhoc networks
-
10.1016/S1004-4132(08)60021-3 2-s2.0-37549019694
-
Yi P., Zou F., Jiang X., Li J., Multi-agent cooperative intrusion response in mobile adhoc networks. Journal of Systems Engineering and Electronics 2007 18 4 785 794 10.1016/S1004-4132(08)60021-3 2-s2.0-37549019694
-
(2007)
Journal of Systems Engineering and Electronics
, vol.18
, Issue.4
, pp. 785-794
-
-
Yi, P.1
Zou, F.2
Jiang, X.3
Li, J.4
-
33
-
-
84877639290
-
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network
-
Yi P., Zhu T., Zhang Q., Wu Y., Li J., Green firewall: an energy-efficient intrusion prevention mechanism in wireless sensor network. Proceedings of the IEEE Global Communications Conference (GLOBECOM '12) December 2012 Anaheim, Calif, USA 3037 3042 10.1109/GLOCOM.2012.6503580 2-s2.0-84877639290
-
Proceedings of the IEEE Global Communications Conference (GLOBECOM '12) December 2012 Anaheim, Calif, USA 10.1109/GLOCOM.2012.6503580 2-s2.0-84877639290
, pp. 3037-3042
-
-
Yi, P.1
Zhu, T.2
Zhang, Q.3
Wu, Y.4
Li, J.5
-
38
-
-
51249105540
-
Defending DoS attacks on broadcast authentication in wireless sensor networks
-
Du X., Guizani M., Xiao Y., Chen H.-H., Defending DoS attacks on broadcast authentication in wireless sensor networks. Proceedings of the IEEE International Conference on Communications (ICC '08) May 2008 Beijing, China IEEE 1653 1657 10.1109/ICC.2008.319 2-s2.0-51249105540
-
Proceedings of the IEEE International Conference on Communications (ICC '08) May 2008 Beijing, China IEEE 10.1109/ICC.2008.319 2-s2.0-51249105540
, pp. 1653-1657
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
40
-
-
84883429883
-
Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network
-
Wazid M., Katal A., Singh Sachan R., Goudar R. H., Singh D. P., Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network. Proceedings of the 2nd International Conference on Communication and Signal Processing (ICCSP '13) April 2013 Melmaruvathur, India 576 581 10.1109/iccsp.2013.6577120 2-s2.0-84883429883
-
Proceedings of the 2nd International Conference on Communication and Signal Processing (ICCSP '13) April 2013 Melmaruvathur, India 10.1109/iccsp.2013.6577120 2-s2.0-84883429883
, pp. 576-581
-
-
Wazid, M.1
Katal, A.2
Singh Sachan, R.3
Goudar, R.H.4
Singh, D.P.5
|