Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool
暂无分享,去创建一个
[1] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[4] Jin Tan,et al. A Majority Voting Scheme in Wireless Sensor Networks for Detecting Suspicious Node , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[5] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.
[6] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[7] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[8] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[9] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[10] Gary Riley. CLIPS: An expert system building tool , 1991 .
[11] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[12] Klaus Wehrle,et al. A Performance Comparison of Recent Network Simulators , 2009, 2009 IEEE International Conference on Communications.
[13] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[14] Gianluca Dini,et al. An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[15] Elizabeth M. Belding-Royer,et al. AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[16] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[17] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[20] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.