-
2
-
-
78651576751
-
An isolation intrusion detection system for hierarchical wireless sensor networks
-
Chen, Rung-Ching, Chia-Fen Hsieh, and Yung-Fa Huang. An isolation intrusion detection system for hierarchical wireless sensor networks. Journal of Networks 5.3 (2010): 335-342.
-
(2010)
Journal of Networks
, vol.5
, Issue.3
, pp. 335-342
-
-
Chen, R.-C.1
Hsieh, C.-F.2
Huang, Y.-F.3
-
3
-
-
61649086771
-
Cooperative intrusion detection in wireless sensor networks
-
Springer Berlin Heidelberg
-
Krontiris, Ioannis, et al. Cooperative intrusion detection in wireless sensor networks. Wireless Sensor Networks. Springer Berlin Heidelberg, 2009. 263-278.
-
(2009)
Wireless Sensor Networks
, pp. 263-278
-
-
Krontiris, I.1
-
4
-
-
77749339862
-
Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
-
ICCIT'09. Fourth International Conference on. IEEE
-
Tiwari, Mukesh, et al. Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. Computer Sciences and Convergence Information Technology, 2009. ICCIT'09. Fourth International Conference on. IEEE, 2009.
-
(2009)
Computer Sciences and Convergence Information Technology, 2009
-
-
Tiwari, M.1
-
5
-
-
58049120336
-
A novel reputation model for malicious node detection in wireless sensor network
-
WiCOM'08. 4th International Conference on. IEEE
-
Yin, Guisheng, et al. A novel reputation model for malicious node detection in wireless sensor network. Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference on. IEEE, 2008.
-
(2008)
Wireless Communications, Networking and Mobile Computing, 2008
-
-
Yin, G.1
-
6
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
-
2010 First IEEE International Conference on. IEEE
-
Berthier, Robin, William H. Sanders, and Himanshu Khurana. Intrusion detection for advanced metering infrastructures: Requirements and architectural directions. Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. IEEE, 2010.
-
(2010)
Smart Grid Communications (SmartGridComm)
-
-
Berthier, R.1
Sanders, W.H.2
Khurana, H.3
-
8
-
-
77955082590
-
Outlier detection techniques for wireless sensor networks: A survey
-
IEEE
-
Zhang, Yang, Nirvana Meratnia, and Paul Havinga. Outlier detection techniques for wireless sensor networks: A survey. Communications Surveys & Tutorials, IEEE 12.2 (2010): 159-170.
-
(2010)
Communications Surveys & Tutorials
, vol.12
, Issue.2
, pp. 159-170
-
-
Zhang, Y.1
Meratnia, N.2
Havinga, P.3
-
10
-
-
70449506562
-
A game theory approach to detect malicious nodes in wireless sensor networks
-
Third International Conference on. IEEE
-
Reddy, Yenumula B. A game theory approach to detect malicious nodes in wireless sensor networks. Sensor Technologies and Applications, 2009. SENSORCOMM'09. Third International Conference on. IEEE, 2009.
-
(2009)
Sensor Technologies and Applications, 2009. SENSORCOMM'09
-
-
Reddy, Y.B.1
-
11
-
-
72349096262
-
Reputation-enabled self-modification for target sensing in wireless sensor networks
-
IEEE Transactions on
-
Wang, Xue, Liang Ding, and Daowei Bi. Reputation-enabled self-modification for target sensing in wireless sensor networks. Instrumentation and Measurement, IEEE Transactions on 59.1 (2010): 171-179.
-
(2010)
Instrumentation and Measurement
, vol.59
, Issue.1
, pp. 171-179
-
-
Wang, X.1
Ding, L.2
Bi, D.3
-
12
-
-
77954712914
-
Novel defense mechanism against data flooding attacks in wireless ad hoc networks
-
IEEE Transactions on
-
Kim, Hyojin, Ramachandra Bhargav Chitti, and JooSeok Song. Novel defense mechanism against data flooding attacks in wireless ad hoc networks. Consumer Electronics, IEEE Transactions on 56.2 (2010): 579-582.
-
(2010)
Consumer Electronics
, vol.56
, Issue.2
, pp. 579-582
-
-
Kim, H.1
Chitti, R.B.2
Song, J.3
-
13
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
IEEE Transactions on
-
Bao, Fenye, et al. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. Network and Service Management, IEEE Transactions on 9.2 (2012): 169-183.
-
(2012)
Network and Service Management
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
-
14
-
-
84876143327
-
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
-
MAY
-
Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu and Sy-Yen Kuo," Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 5, MAY 2013
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.5
-
-
Chia-Mu, Y.1
Tsou, Y.-T.2
Chun-Shien, L.3
Kuo, S.-Y.4
-
15
-
-
85008524827
-
Thwarting Control-Channel Jamming Attacks from Inside Jammers
-
SEPTEMBER
-
Sisi Liu, Loukas Lazos and Marwan Krunz, " Thwarting Control-Channel Jamming Attacks from Inside Jammers" IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 9, SEPTEMBER 2012.
-
(2012)
IEEE Transactions on Mobile Computing
, vol.11
, Issue.9
-
-
Liu, S.1
Lazos, L.2
Krunz, M.3
-
16
-
-
84905744453
-
-
Network Simulator
-
Network Simulator: http:///www.isi.edu/nsnam
-
-
-
-
17
-
-
84860171458
-
A Performance Comparison of Energy Efficient MAC Protocols for Wireless Sensor Networks
-
July
-
T. Ezzedine, M. Miladi, R. Bouallegue, "A Performance Comparison of Energy Efficient MAC Protocols for Wireless Sensor Networks", International Review on Computers and Software (IRECOS), Vol. 3. no. 4, pp. 337-348, July 2008.
-
(2008)
International Review On Computers and Software (IRECOS)
, vol.3
, Issue.4
, pp. 337-348
-
-
Ezzedine, T.1
Miladi, M.2
Bouallegue, R.3
-
18
-
-
84877314321
-
Cluster-based Self-Organization Scheme for Mobile Wireless Sensor Networks
-
March
-
M. Lehsaini, H. Guyennet, M. Feham, "Cluster-based Self-Organization Scheme for Mobile Wireless Sensor Networks", International Review on Computers and Software (IRECOS), Vol. 3. no. 2, pp. 185-192, March 2008.
-
(2008)
International Review On Computers and Software (IRECOS)
, vol.3
, Issue.2
, pp. 185-192
-
-
Lehsaini, M.1
Guyennet, H.2
Feham, M.3
|