Security Assessment Model to Analysis DOS Attacks in WSN
暂无分享,去创建一个
Hideya Ochiai | Mohd Nizam Husen | Abdulaziz Aborujilah | Rasheed Mohammad Nassr | Tawfik Al Hadhrami | Nor Azlina Ali | AbdulAleem Al-Othmani | Nur Syahela | H. Ochiai | R. Nassr | Abdulaziz Aborujilah | AbdulAleem Al-Othmani | Nur Syahela
[1] Joan Arnedo-Moreno,et al. ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[2] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[3] Jun Li,et al. Securing the Smart Home via a Two-Mode Security Framework , 2018, SecureComm.
[4] Kishor S. Trivedi,et al. Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package , 2012 .
[5] J. K. Kalita,et al. Botnet in DDoS Attacks: Trends and Challenges , 2015, IEEE Communications Surveys & Tutorials.
[6] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[7] Mihai T. Lazarescu,et al. Design of a WSN Platform for Long-Term Environmental Monitoring for IoT Applications , 2013, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[8] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[9] Mariëlle Stoelinga,et al. Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools , 2014, Comput. Sci. Rev..
[10] Jin B. Hong,et al. A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..
[11] Branislav Bosanský,et al. Optimal Network Security Hardening Using Attack Graph Games , 2015, IJCAI.
[12] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).