Wireless Sensor Network based: Design Principles & measuring performance of IDS
暂无分享,去创建一个
[1] Ajith Abraham,et al. IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).
[2] Sheng-Tzong Cheng,et al. Distributed Detection in Wireless Sensor Networks , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).
[3] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[4] Huirong Fu,et al. Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[5] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[6] Qilian Liang,et al. Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[7] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[8] Peng Ning,et al. LAD: Localization anomaly detection for wireless sensor networks , 2006, J. Parallel Distributed Comput..
[10] Ioannis Chatzigiannakis,et al. A decentralized intrusion detection system for increasing security of wireless sensor networks , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).
[11] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[12] A. Casaca,et al. A Wireless Sensor Network Reliable Architecture for Intrusion Detection , 2008, 2008 Next Generation Internet Networks.
[13] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[14] Heejo Lee,et al. Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[15] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[16] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.