-
1
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Y. Zhou, Y. Fang and Y. Zhang securing wireless sensor networks: A survey, IEEE Communications Survey, vol.10, no. 3, pp.6-28, 2008
-
(2008)
IEEE Communications Survey
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
2
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
20-22 February, Phoenix Park, Korea
-
A.-S.K.Pathan, H.-W.Lee, and C.S.Hong, "Security in Wireless Sensor Networks: Issues and Challenges" in 8th international conference on Advanced Communication Technology (IEEE ICACT 2006), Volume 2, 20-22 February, Phoenix Park, Korea 2006, PP. 1043-1048
-
(2006)
8th International Conference on Advanced Communication Technology (IEEE ICACT 2006)
, vol.2
, pp. 1043-1048
-
-
Pathan, A.-S.K.1
Lee, H.-W.2
Hong, C.S.3
-
3
-
-
33749822913
-
Fast and scalable pattern matching for network intrusion detection systems
-
Oct
-
Dharmapurikar S, Lockwood J.W, "Fast and Scalable Pattern Matching for Network Intrusion Detection Systems", Selected Areas in Communications, IEEE Journal on, vol.24, no.10, pp.1781-1792, Oct. 2006
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.10
, pp. 1781-1792
-
-
Dharmapurikar, S.1
Lockwood, J.W.2
-
4
-
-
0037619022
-
Pushing support constraints into association rules mining
-
May-June 2003. International Conference on, 2, no, 413416,6-7June
-
Ke Wang, Yu He, Jiawei Han, "Pushing support constraints into association rules mining", Knowledge and Data Engineering, IEEE Transactions on, vol.15, no.3, pp. 642-658, May-June 2003. International Conference on, vol.2, no, pp.413416,6-7June2009
-
(2009)
Knowledge and Data Engineering, IEEE Transactions on
, vol.15
, Issue.3
, pp. 642-658
-
-
Wang, K.1
He, Y.2
Han, J.3
-
5
-
-
70350555372
-
Improvement of association rules mining algorithm in wireless network intrusion detection
-
Ye Changguo, Zhang Qin, Zhou Jingwei, Wei Nianzhong, Zhu Xiaorong, Wang Tailei, "Improvement of Association Rules Mining Algorithm in Wireless Network Intrusion Detection", Computational Intelligence and Natural Computing, 2009. CINC '09
-
Computational Intelligence and Natural Computing, 2009. CINC '09
-
-
Changguo, Y.1
Qin, Z.2
Jingwei, Z.3
Nianzhong, W.4
Xiaorong, Z.5
Tailei, W.6
-
6
-
-
79953040341
-
Semantic intruder detection system in WSN
-
14-16 Dec
-
Poorani M, Vaidehi V, Rajesh M, Bharghavi Balamuralidhar, Chandra G, "Semantic Intruder Detection System in WSN," Advanced Computing (ICoAC), 2010 Second International Conference, vol., no., pp.26-32, 14-16 Dec. 2010
-
(2010)
Advanced Computing (ICoAC), 2010 Second International Conference
, pp. 26-32
-
-
Poorani, M.1
Vaidehi, V.2
Rajesh, M.3
Bharghavi, B.4
Chandra, G.5
-
7
-
-
0035402112
-
Probabilistic echniques for intrusion detection based on computer audit data
-
Jul
-
N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, "Probabilistic echniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274,Jul. 2001
-
(2001)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
8
-
-
70349153822
-
Intelligent Intrusion Detection System (In2DS) using Wireless Sensor Networks
-
26-29 March
-
Pramod P.J, Srikanth S.V, Vivek N, Patil M.U, Sarat C, "Intelligent Intrusion Detection System (In2DS) using Wireless Sensor Networks", Networking, Sensing and Control, 2009. ICNSC '09. International Conference on, vol., no., pp.587-591, 26-29 March 2009
-
(2009)
Networking, Sensing and Control, 2009. ICNSC '09. International Conference on
, pp. 587-591
-
-
Pramod, P.J.1
Srikanth, S.V.2
Vivek, N.3
Patil, M.U.4
Sarat, C.5
-
9
-
-
0033293396
-
Toward a taxonomy of intrusion detection systems
-
H. Debar, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion detection systems," Comput. Networks, vol. 31, pp. 805-822, 2000
-
(2000)
Comput. Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
10
-
-
84901643828
-
An evolutionary approach to generate fuzzy anomaly signatures
-
West Point, NY, Jun
-
F. Gonzalez, J. Gomez, M. Kaniganti, and D. Dasgupta, "An evolutionary approach to generate fuzzy anomaly signatures," in Proc. 4th Annu. IEEE information Assurance Workshop, West Point, NY, Jun. 2013,pp. 251-259
-
(2013)
Proc. 4th Annu. IEEE Information Assurance Workshop
, pp. 251-259
-
-
Gonzalez, F.1
Gomez, J.2
Kaniganti, M.3
Dasgupta, D.4
-
11
-
-
84857317393
-
Improvement of association rules mining algorithm in wireless network intrusion detection
-
6-7June
-
Ye Changguo, Zhang Qin, Zhou Jingwei, Wei Nianzhong, Zhu Xiaorong, Wang Tailei, "Improvement of Association Rules Mining Algorithm in Wireless Network Intrusion Detection", Computational Intelligence and Natural Computing, 2009. CINC '09. International Conference on, vol.2, no, pp.413416,6-7June2009
-
(2009)
Computational Intelligence and Natural Computing, 2009. CINC '09. International Conference on
, vol.2
, pp. 413416
-
-
Changguo, Y.1
Qin, Z.2
Jingwei, Z.3
Nianzhong, W.4
Xiaorong, Z.5
Tailei, W.6
-
12
-
-
0035402112
-
Probabilistic echniques for intrusion detection based on computer audit data
-
Jul
-
N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, "Probabilistic echniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274,Jul. 2011
-
(2011)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
13
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb
-
Mishra, A.; Nadkarni, K.; Patcha, A. "Intrusion detection in wireless ad hoc networks," Wireless Communications, IEEE, vol.11, no.1, pp. 48-60, Feb 2014
-
(2014)
Wireless Communications, IEEE
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
14
-
-
84991477170
-
Bit-split string-matching engines for intrusion detection and prevention
-
Mar
-
L. Tan, B. Brotherton, and T. Sherwood, "Bit-split string-matching engines for intrusion detection and prevention," ACM Trans. Archit. And Code Optimization, vol. 3, no. 1, pp. 3-34, Mar. 2006
-
(2006)
ACM Trans. Archit. and Code Optimization
, vol.3
, Issue.1
, pp. 3-34
-
-
Tan, L.1
Brotherton, B.2
Sherwood, T.3
|