Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing
暂无分享,去创建一个
Maxim O. Kalinin | Peter D. Zegzhda | Daria S. Lavrova | Dmitry P. Zegzhda | Alexander I. Pechenkin | P. D. Zegzhda | Alexander Minin | M. Kalinin | D. Lavrova | D. Zegzhda | A. Pechenkin | A. Minin
[1] Daria S. Lavrova,et al. Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things , 2015, Int. J. Commun. Networks Inf. Secur..
[2] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[3] P. Saraswathi,et al. Multi-Objective Evolutionary Algorithm for Routing in Wireless Mesh Networks , 2014 .
[4] Yan Li,et al. Channel allocation method for multi-radio wireless mesh networks based on a genetic algorithm , 2016 .
[5] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[6] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[7] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[8] Yuguang Fang,et al. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Maxim O. Kalinin,et al. Information security in computer networks with dynamic topology , 2015, SIN.
[10] Somanath Tripathy,et al. WAKE: Authentication and Key Establishment for Wireless Mesh Network , 2012, SNDS.
[11] Li Xu,et al. A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks , 2014, ESORICS.