Comprehensive analysis of security attacks and intrusion detection system in wireless sensor networks
暂无分享,去创建一个
[1] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[2] F MidkiffScott,et al. Denial-of-Service in Wireless Sensor Networks , 2008 .
[3] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[4] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[5] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[6] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[7] Yassine Maleh,et al. A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks , 2013, ArXiv.
[8] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[9] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[10] Andreas Strikos. A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .
[11] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[12] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[13] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[14] Anazida Zainal,et al. A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .
[15] Guiling Wang,et al. Catching Packet Droppers and Modifiers in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[16] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[17] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[18] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[19] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[20] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[21] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[22] Kumaraguru,et al. A Survey On Intrusion Detection System In Wireless Sensor Networks , 2017 .
[23] Padmavati Khandnor,et al. Intrusion detection system in wireless sensor networks: A comprehensive review , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[24] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.