An Intrusion Detection System for Internet of Medical Things
暂无分享,去创建一个
Geethapriya Thamilarasu | Adedayo Odesile | Andrew Hoang | G. Thamilarasu | Adedayo Odesile | Andrew Hoang
[1] John E. Gaffney,et al. Evaluation of Intrusion Detection Systems , 2003, Journal of research of the National Institute of Standards and Technology.
[2] Shancang Li. Security and Vulnerability in the Internet of Things , 2017 .
[3] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[4] M Sushma,et al. INTRUSION DETECTION AND PREVENTION OF NODE REPLICATION ATTACKS IN WIRELESS BODY AREA SENSOR NETWORK , 2012 .
[5] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.
[6] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[7] Nidal Nasser,et al. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks , 2007, Comput. Commun..
[8] K. V. Arya,et al. Feedback Reliability Ratio of an Intrusion Detection System , 2012, J. Information Security.
[9] Haider Abbas,et al. Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review , 2019, IEEE Communications Surveys & Tutorials.
[10] Luca Simone Ronga,et al. A New Modulation for Intrinsically Secure Radio Channel in Wireless Systems , 2009, Wirel. Pers. Commun..
[11] Georgios Kambourakis,et al. Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[12] Geethapriya Thamilarasu,et al. iDetect: an intelligent intrusion detection system for wireless body area networks , 2016, Int. J. Secur. Networks.
[13] Min Chen,et al. An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN) , 2011, 2011 IEEE International Conference on Communications (ICC).
[14] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[15] Colleen Swanson,et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.
[16] J. Martin Leo Manickam,et al. Public key cryptosystem based security in wireless body area network , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].
[17] Srinivas Sampalli,et al. A security suite for wireless body area networks , 2012, ArXiv.
[18] D. Dimitrov. Medical Internet of Things and Big Data in Healthcare , 2016, Healthcare informatics research.
[19] Muhammad Usman,et al. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks , 2012 .
[20] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[21] Matthias Hollick,et al. Lightweight energy consumption-based intrusion detection system for wireless sensor networks , 2015, SAC '13.
[22] Zhiyuan Ma,et al. Autonomous mobile agent based intrusion detection framework in wireless body area networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[23] Fang Liu,et al. Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.
[24] Geethapriya Thamilarasu,et al. Distributed intrusion detection using mobile agents in wireless body area networks , 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST).
[25] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[26] Lorenzo Mucchi,et al. Physical layer security based on spread‐spectrum watermarking and jamming receiver , 2017, Trans. Emerg. Telecommun. Technol..
[27] Qinghe Du,et al. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions , 2018, Entropy.
[28] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[29] T. Dimitriou,et al. Security issues in biomedical wireless sensor networks , 2008, 2008 First International Symposium on Applied Sciences on Biomedical and Communication Technologies.
[30] Mohsen Toorani. On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard , 2015, Financial Cryptography Workshops.
[31] Wenjia Li,et al. Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.
[32] Feng Zhao,et al. Accurate CPU Power Modeling for Multicore Smartphones , 2015 .
[33] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[34] Yan Zhang,et al. A safe mobile agent system for distributed intrusion detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).