메뉴 건너뛰기




Volumn , Issue , 2016, Pages 724-728

Pattern matching intrusion detection technique for Wireless Sensor Networks

Author keywords

Intrusion Detection System; Intrusion Prevention System; pattern matching; security goal; Wireless Sensor Network

Indexed keywords

AUTOMATION; INFORMATION SCIENCE; INTELLIGENT BUILDINGS; INTRUSION DETECTION; MERCURY (METAL); MILITARY APPLICATIONS; NETWORK SECURITY; PATTERN MATCHING; PATTERN RECOGNITION; SENSOR NODES;

EID: 84988024934     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AEEICB.2016.7538389     Document Type: Conference Paper
Times cited : (15)

References (14)
  • 1
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • Y. Zhou, Y. Fang and Y. Zhang securing wireless sensor networks: A survey, IEEE Communications Survey, vol.10, no. 3, pp.6-28, 2008
    • (2008) IEEE Communications Survey , vol.10 , Issue.3 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3
  • 3
    • 33749822913 scopus 로고    scopus 로고
    • Fast and scalable pattern matching for network intrusion detection systems
    • Oct
    • Dharmapurikar S, Lockwood J.W, "Fast and Scalable Pattern Matching for Network Intrusion Detection Systems", Selected Areas in Communications, IEEE Journal on, vol.24, no.10, pp.1781-1792, Oct. 2006
    • (2006) Selected Areas in Communications, IEEE Journal on , vol.24 , Issue.10 , pp. 1781-1792
    • Dharmapurikar, S.1    Lockwood, J.W.2
  • 4
    • 0037619022 scopus 로고    scopus 로고
    • Pushing support constraints into association rules mining
    • May-June 2003. International Conference on, 2, no, 413416,6-7June
    • Ke Wang, Yu He, Jiawei Han, "Pushing support constraints into association rules mining", Knowledge and Data Engineering, IEEE Transactions on, vol.15, no.3, pp. 642-658, May-June 2003. International Conference on, vol.2, no, pp.413416,6-7June2009
    • (2009) Knowledge and Data Engineering, IEEE Transactions on , vol.15 , Issue.3 , pp. 642-658
    • Wang, K.1    He, Y.2    Han, J.3
  • 7
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic echniques for intrusion detection based on computer audit data
    • Jul
    • N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, "Probabilistic echniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274,Jul. 2001
    • (2001) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.31 , Issue.4 , pp. 266-274
    • Ye, N.1    Li, X.2    Chen, Q.3    Emran, S.M.4    Xu, M.5
  • 9
    • 0033293396 scopus 로고    scopus 로고
    • Toward a taxonomy of intrusion detection systems
    • H. Debar, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion detection systems," Comput. Networks, vol. 31, pp. 805-822, 2000
    • (2000) Comput. Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 12
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic echniques for intrusion detection based on computer audit data
    • Jul
    • N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, "Probabilistic echniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274,Jul. 2011
    • (2011) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.31 , Issue.4 , pp. 266-274
    • Ye, N.1    Li, X.2    Chen, Q.3    Emran, S.M.4    Xu, M.5
  • 13
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb
    • Mishra, A.; Nadkarni, K.; Patcha, A. "Intrusion detection in wireless ad hoc networks," Wireless Communications, IEEE, vol.11, no.1, pp. 48-60, Feb 2014
    • (2014) Wireless Communications, IEEE , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 14
    • 84991477170 scopus 로고    scopus 로고
    • Bit-split string-matching engines for intrusion detection and prevention
    • Mar
    • L. Tan, B. Brotherton, and T. Sherwood, "Bit-split string-matching engines for intrusion detection and prevention," ACM Trans. Archit. And Code Optimization, vol. 3, no. 1, pp. 3-34, Mar. 2006
    • (2006) ACM Trans. Archit. and Code Optimization , vol.3 , Issue.1 , pp. 3-34
    • Tan, L.1    Brotherton, B.2    Sherwood, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.