Study of Immune-Based Intrusion Detection Technology in Wireless Sensor Networks
暂无分享,去创建一个
[1] Huirong Fu,et al. Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[2] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[3] Tang Chao-jing. Integrated artificial immune system for intrusion detection , 2012 .
[4] Tang Chao-jing. DCA based Data Fusion Method , 2011 .
[5] Sajal K. Das,et al. A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[6] Julie Greensmith,et al. The Dendritic Cell Algorithm for Intrusion Detection , 2013, Biologically Inspired Networking and Sensing.
[7] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[8] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[9] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[10] Gu Ji-yan,et al. The Dendritic Cell Algorithm , 2011 .
[11] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[12] Feifei Gao,et al. Accurate and Efficient Node Localization for Mobile Sensor Networks , 2013, Mob. Networks Appl..
[13] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[14] Chae Hoon Lim. LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[15] Guoliang Xing,et al. SGF: A state-free gradient-based forwarding protocol for wireless sensor networks , 2009, TOSN.
[16] Chase Qishi Wu,et al. Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[17] Fengqi Yu,et al. Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[18] Ma Jian-feng. Survey of wireless sensor network security techniques , 2007 .
[19] Yang Yi-xian. Danger theory inspired intrusion detection model for wireless sensor networks , 2012 .
[20] Julie Greensmith,et al. Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.
[21] Mei Tao,et al. Survey on wireless sensors network , 2004 .
[22] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[23] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[24] Julie Greensmith,et al. The DCA: SOMe comparison , 2008, Evol. Intell..
[25] Ali Miri,et al. An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[26] Yu Gu,et al. Mobility-Assisted Node Localization Based on TOA Measurements Without Time Synchronization in Wireless Sensor Networks , 2012, Mob. Networks Appl..
[27] Hongyang Chen,et al. An Importance Sampling Method for TDOA-Based Source Localization , 2011, IEEE Transactions on Wireless Communications.
[28] Hu Yan-jun. Wireless Sensor Network Technology , 2006 .
[29] Ricardo Dahab,et al. SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[30] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[31] Luci Pirmez,et al. Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.
[32] Taking Stock of a Discipline , 1983 .
[33] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[34] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[35] Zhou Li-ping. Research on Differentiation Model and Application of Dendritic Cells in Artificial Immune System , 2008 .
[36] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[37] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[38] Bin Wang,et al. System-level simulation methodology and platform for mobile cellular systems , 2011, IEEE Communications Magazine.
[39] Suat Ozdemir,et al. Secure and reliable data aggregation for wireless sensor networks , 2007 .
[40] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[41] Helena Szczerbicka,et al. AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.
[42] H. Vincent Poor,et al. Mobile element assisted cooperative localization for wireless sensor networks with obstacles , 2010, IEEE Transactions on Wireless Communications.