-
3
-
-
84882276491
-
Proxy network intrusion detection system for cloud computing
-
May
-
U. Oktay and O. K. Sahingoz, "Proxy network intrusion detection system for cloud computing," in Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on, May 2013, pp. 98-104.
-
(2013)
Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on
, pp. 98-104
-
-
Oktay, U.1
Sahingoz, O.K.2
-
4
-
-
84867604390
-
A survey of intrusion detection schemes in wireless sensor networks
-
M. A. Rassam, M. Maarof, A. Zainal et al., "A survey of intrusion detection schemes in wireless sensor networks," American Journal of Applied Sciences, vol. 9, no. 10, p. 1636, 2012.
-
(2012)
American Journal of Applied Sciences
, vol.9
, Issue.10
, pp. 1636
-
-
Rassam, M.A.1
Maarof, M.2
Zainal, A.3
-
7
-
-
84885960208
-
Large scale wireless sensor networks with multi-level dynamic key management scheme
-
O. K. Sahingoz, "Large scale wireless sensor networks with multi-level dynamic key management scheme," Journal of Systems Architecture, vol. 59, no. 9, pp. 801-807, 2013.
-
(2013)
Journal of Systems Architecture
, vol.59
, Issue.9
, pp. 801-807
-
-
Sahingoz, O.K.1
-
8
-
-
84881313532
-
On the vital areas of intrusion detection systems in wireless sensor networks
-
A. Abduvaliyev, A.-S. K. Pathan, J. Zhou, R. Roman, and W.-C. Wong, "On the vital areas of intrusion detection systems in wireless sensor networks." IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1223-1237, 2013.
-
(2013)
IEEE Communications Surveys and Tutorials
, vol.15
, Issue.3
, pp. 1223-1237
-
-
Abduvaliyev, A.1
Pathan, A.-S.K.2
Zhou, J.3
Roman, R.4
Wong, W.-C.5
-
9
-
-
84887395706
-
Parametric analysis of impact of jamming in wireless sensor networks
-
IEEE
-
S. Rao, S. Deepak, and P. Pradeep, "Parametric analysis of impact of jamming in wireless sensor networks," in Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on. IEEE, 2013, pp. 1-5.
-
(2013)
Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on
, pp. 1-5
-
-
Rao, S.1
Deepak, S.2
Pradeep, P.3
-
10
-
-
84941040023
-
International journal of advanced research in computer science and software engineering
-
S. Roy, S. Nag, I. K. Maitra, and S. K. Bandyopadhyay, "International journal of advanced research in computer science and software engineering," International Journal, vol. 3, no. 6, 2013.
-
(2013)
International Journal
, vol.3
, Issue.6
-
-
Roy, S.1
Nag, S.2
Maitra, I.K.3
Bandyopadhyay, S.K.4
-
12
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Springer
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, "Intrusion detection of sinkhole attacks in wireless sensor networks," in Algorithmic Aspects of Wireless Sensor Networks. Springer, 2008, pp. 150-161.
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
13
-
-
34548031104
-
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
-
E. C. Ngai, J. Liu, and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2353-2364, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.11
, pp. 2353-2364
-
-
Ngai, E.C.1
Liu, J.2
Lyu, M.R.3
-
14
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
ACM
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," in Proceedings of the 3rd international symposium on Information processing in sensor networks. ACM, 2004, pp. 259-268.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
16
-
-
85116427082
-
Defending against sybil attacks in sensor networks
-
IEEE
-
Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, "Defending against sybil attacks in sensor networks," in Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on. IEEE, 2005, pp. 185-191.
-
(2005)
Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on
, pp. 185-191
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.S.3
Ning, P.4
-
17
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc networks, vol. 1, no. 2, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
79961235838
-
Hello flood attack and its countermeasures in wireless sensor networks
-
V. P. Singh, S. Jain, and J. Singhai, "Hello flood attack and its countermeasures in wireless sensor networks," International journal of Computer Science issues, vol. 7, no. 11, pp. 23-27, 2010.
-
(2010)
International Journal of Computer Science Issues
, vol.7
, Issue.11
, pp. 23-27
-
-
Singh, V.P.1
Jain, S.2
Singhai, J.3
-
19
-
-
80052384799
-
Wireless sensor network security analysis
-
H. K. Kalita and A. Kar, "Wireless sensor network security analysis," International Journal of Next-Generation Networks (IJNGN), vol. 1, no. 1, pp. 1-10, 2009.
-
(2009)
International Journal of Next-Generation Networks (IJNGN)
, vol.1
, Issue.1
, pp. 1-10
-
-
Kalita, H.K.1
Kar, A.2
-
21
-
-
84900637145
-
A survey of intrusion detection in wireless network applications
-
R. Mitchell and I.-R. Chen, "A survey of intrusion detection in wireless network applications," Computer Communications, vol. 42, pp. 1-23, 2014.
-
(2014)
Computer Communications
, vol.42
, pp. 1-23
-
-
Mitchell, R.1
Chen, I.-R.2
-
22
-
-
84857692970
-
A survey of intrusion detection systems for wireless sensor networks
-
A. H. Farooqi and F. A. Khan, "A survey of intrusion detection systems for wireless sensor networks," International Journal of Ad Hoc and Ubiquitous Computing, vol. 9, no. 2, pp. 69-83, 2012.
-
(2012)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.9
, Issue.2
, pp. 69-83
-
-
Farooqi, A.H.1
Khan, F.A.2
-
23
-
-
84885462061
-
Wireless sensor network anomalies: Diagnosis and detection strategies
-
Springer
-
R. Jurdak, X. R. Wang, O. Obst, and P. Valencia, "Wireless sensor network anomalies: Diagnosis and detection strategies," in Intelligence-Based Systems Engineering. Springer, 2011, pp. 309-325.
-
(2011)
Intelligence-Based Systems Engineering
, pp. 309-325
-
-
Jurdak, R.1
Wang, X.R.2
Obst, O.3
Valencia, P.4
-
26
-
-
84893471830
-
Applying data mining techniques to intrusion detection in wireless sensor networks
-
IEEE
-
L. Coppolino, S. DAntonio, A. Garofalo, and L. Romano, "Applying data mining techniques to intrusion detection in wireless sensor networks," in P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on. IEEE, 2013, pp. 247-254.
-
(2013)
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on
, pp. 247-254
-
-
Coppolino, L.1
DAntonio, S.2
Garofalo, A.3
Romano, L.4
-
29
-
-
84870816592
-
Multi-level dynamic key management for scalable wireless sensor networks with uav
-
Springer Netherlands
-
O. K. Sahingoz, "Multi-level dynamic key management for scalable wireless sensor networks with uav," in Ubiquitous Information Technologies and Applications, ser. Lecture Notes in Electrical Engineering, vol. 214. Springer Netherlands, 2013, pp. 11-19.
-
(2013)
Ubiquitous Information Technologies and Applications, Ser. Lecture Notes in Electrical Engineering
, vol.214
, pp. 11-19
-
-
Sahingoz, O.K.1
|