A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities
暂无分享,去创建一个
Mianxiong Dong | Kaoru Ota | Jun Wu | Chunxiao Li | Jun Wu | M. Dong | K. Ota | Chunxiao Li
[1] Yukio Ohsawa,et al. KeyGraph: automatic indexing by co-occurrence graph based on building construction metaphor , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.
[2] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[3] Ravi Sandhu,et al. The ABC Core Model for Usage Control: Integrating Authorizations, oBligations, and Conditions , 2002 .
[4] B. Thuraisingham,et al. Secure sensor information management and mining , 2004, IEEE Signal Processing Magazine.
[5] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[6] Jaehong Park,et al. Formal model and policy specification of usage control , 2005, TSEC.
[7] Yukio Ohsawa,et al. Data crystallization: a project beyond chance discovery for discovering unobservable events , 2005, 2005 IEEE International Conference on Granular Computing.
[8] Giuseppe Anastasi,et al. Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach , 2005, Pervasive Mob. Comput..
[9] Mark Handley,et al. The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[10] Jian Ma,et al. Designing Energy-Efficient Wireless Sensor Networks with Mobile Sinks , 2006 .
[11] Vijay Varadharajan,et al. A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Ali A. Ghorbani,et al. Detecting Network Anomalies Using Different Wavelet Basis Functions , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[13] K. Q. Yan,et al. A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .
[14] James Harbin,et al. Wireless sensor network wormhole avoidance using disturbance-based routing schemes , 2009, 2009 6th International Symposium on Wireless Communication Systems.
[15] Lin Chen,et al. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.
[16] Nora Cuppens-Boulahia,et al. Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[17] Minyi Guo,et al. Dynamic Itinerary Planning for Mobile Agents with a Content-Specific Approach in Wireless Sensor Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.
[18] Tae Ho Cho,et al. A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks , 2010, IEICE Trans. Commun..
[19] Mianxiong Dong,et al. Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks , 2011, WASA.
[20] Jianhua Li,et al. Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[21] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[22] Dong Hoon Lee,et al. PACPs: practical access control protocols for wireless sensor networks , 2012, IEEE Transactions on Consumer Electronics.
[23] W. Marsden. I and J , 2012 .
[24] Raj Jain,et al. Network virtualization and software defined networking for cloud computing: a survey , 2013, IEEE Communications Magazine.
[25] Tongtong Li,et al. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[26] Laurence T. Yang,et al. Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks , 2014, Comput. Networks.
[27] M.Kanchana,et al. VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS , 2014 .
[28] Ying Wang,et al. A novel design for content delivery over software defined mobile social networks , 2015, IEEE Network.
[29] Jianhua Li,et al. Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks , 2015, IEEE Sensors Journal.
[30] Zhou Su,et al. Content distribution over content centric mobile social networks in 5G , 2015, IEEE Communications Magazine.
[31] Song Guo,et al. A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.