Intrusion detection of sinkhole attacks in large-scale wireless sensor networks
暂无分享,去创建一个
[1] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[2] B. Brodsky,et al. Nonparametric Methods in Change Point Problems , 1993 .
[3] Sencun Zhu,et al. A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses , 2009, IEEE INFOCOM 2009.
[4] Min Song,et al. Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .
[5] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Sensor Networks , 2006, 2006 Securecomm and Workshops.
[6] Sencun Zhu,et al. Sensor node compromise detection: the location perspective , 2007, IWCMC.
[7] Mansoor Alam,et al. Compromised Sensor Nodes Detection: A Quantitative Approach , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[8] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[9] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[12] Ahmad Khonsari,et al. Misbehavior resilient multi-path data transmission in mobile ad-hoc networks , 2006, SASN '06.
[13] Yao Zheng,et al. The Relation of CMM and Software Lifecycle Model , 2007 .
[14] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.