Classification of DoS Attacks in Smart Underwater Wireless Sensor Network
暂无分享,去创建一个
Wang Jian | Bilal Ahmad | Rabia Noor Enam | Ali Abbas | Bilal Ahmad | Jian Wang | A. Abbas
[1] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[2] Gerhard P. Hancke,et al. Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.
[3] Shu-Chin Wang,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..
[4] Anazida Zainal,et al. A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .
[5] N. Marriwala,et al. An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.
[6] Hoon Oh,et al. An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks , 2013 .
[7] Valerio Formicola,et al. Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.
[8] Neeraj Kumar,et al. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[9] Luc Van Gool,et al. The Pascal Visual Object Classes Challenge: A Retrospective , 2014, International Journal of Computer Vision.
[10] Rupinder Kaur,et al. REVIEW OF BLACK HOLE AND GREY HOLE ATTACK , 2014 .
[11] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[12] Sudhir Kumar Sharma,et al. Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection , 2015 .
[13] Yiming Miao,et al. Cluster-Head Election Algorithm for Wireless Sensor Networks Based on LEACH Protocol , 2015 .
[14] Sangita Chaudhari,et al. DoS Attack Prevention Technique in Wireless Sensor Networks , 2016 .
[15] S. Jangir,et al. A comprehensive review on detection of wormhole attack in MANET , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).
[16] Najma Ismat,et al. Connectivity and Coverage Based Grid-Cluster Size Calculation in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[17] Shakil Ahmed,et al. A Survey of Energy Conservation Mechanisms for Dynamic Cluster Based Wireless Sensor Networks , 2018 .