메뉴 건너뛰기




Volumn , Issue , 2015, Pages

A survey of intrusion detection systems in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; COMPUTER CRIME; INTELLIGENT BUILDINGS; INTRUSION DETECTION; NETWORK SECURITY; SURVEYS;

EID: 84941052445     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMSAO.2015.7152200     Document Type: Conference Paper
Times cited : (103)

References (29)
  • 4
    • 84867604390 scopus 로고    scopus 로고
    • A survey of intrusion detection schemes in wireless sensor networks
    • M. A. Rassam, M. Maarof, A. Zainal et al., "A survey of intrusion detection schemes in wireless sensor networks," American Journal of Applied Sciences, vol. 9, no. 10, p. 1636, 2012.
    • (2012) American Journal of Applied Sciences , vol.9 , Issue.10 , pp. 1636
    • Rassam, M.A.1    Maarof, M.2    Zainal, A.3
  • 7
    • 84885960208 scopus 로고    scopus 로고
    • Large scale wireless sensor networks with multi-level dynamic key management scheme
    • O. K. Sahingoz, "Large scale wireless sensor networks with multi-level dynamic key management scheme," Journal of Systems Architecture, vol. 59, no. 9, pp. 801-807, 2013.
    • (2013) Journal of Systems Architecture , vol.59 , Issue.9 , pp. 801-807
    • Sahingoz, O.K.1
  • 10
    • 84941040023 scopus 로고    scopus 로고
    • International journal of advanced research in computer science and software engineering
    • S. Roy, S. Nag, I. K. Maitra, and S. K. Bandyopadhyay, "International journal of advanced research in computer science and software engineering," International Journal, vol. 3, no. 6, 2013.
    • (2013) International Journal , vol.3 , Issue.6
    • Roy, S.1    Nag, S.2    Maitra, I.K.3    Bandyopadhyay, S.K.4
  • 13
    • 34548031104 scopus 로고    scopus 로고
    • An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
    • E. C. Ngai, J. Liu, and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Computer Communications, vol. 30, no. 11, pp. 2353-2364, 2007.
    • (2007) Computer Communications , vol.30 , Issue.11 , pp. 2353-2364
    • Ngai, E.C.1    Liu, J.2    Lyu, M.R.3
  • 17
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc networks, vol. 1, no. 2, pp. 293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 18
    • 79961235838 scopus 로고    scopus 로고
    • Hello flood attack and its countermeasures in wireless sensor networks
    • V. P. Singh, S. Jain, and J. Singhai, "Hello flood attack and its countermeasures in wireless sensor networks," International journal of Computer Science issues, vol. 7, no. 11, pp. 23-27, 2010.
    • (2010) International Journal of Computer Science Issues , vol.7 , Issue.11 , pp. 23-27
    • Singh, V.P.1    Jain, S.2    Singhai, J.3
  • 21
    • 84900637145 scopus 로고    scopus 로고
    • A survey of intrusion detection in wireless network applications
    • R. Mitchell and I.-R. Chen, "A survey of intrusion detection in wireless network applications," Computer Communications, vol. 42, pp. 1-23, 2014.
    • (2014) Computer Communications , vol.42 , pp. 1-23
    • Mitchell, R.1    Chen, I.-R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.