Detection of attacker and location in wireless sensor network as an application for border surveillance
暂无分享,去创建一个
[1] Subhash Challa,et al. An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .
[2] Valerio Formicola,et al. Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.
[3] Mohiuddin Ahmed,et al. Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection , 2015, Annals of Data Science.
[4] WADE FOY,et al. Position-Location Solutions by Taylor-Series Estimation , 1976, IEEE Transactions on Aerospace and Electronic Systems.
[5] Alvin S. Lim,et al. Interconnection between IP Networks and Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[6] H. C. Schau,et al. Passive source localization employing intersecting spherical surfaces from time-of-arrival differences , 1987, IEEE Trans. Acoust. Speech Signal Process..
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Jianzhong Li,et al. Compressing Information of Target Tracking in Wireless Sensor Networks , 2011, Wirel. Sens. Netw..
[9] Rakowsky Uwe Kay,et al. Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling , 2007 .
[10] Marine Minier,et al. Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[11] Xu Huang,et al. Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.
[12] Dharmendra Sharma,et al. A Novel Framework for Abnormal Behaviour Identification and Detection for Wireless Sensor Networks , 2012 .
[13] Kari Sentz,et al. Combination of Evidence in Dempster-Shafer Theory , 2002 .
[14] Reza Ebrahimpour,et al. Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..
[15] John B. McKitterick. Sensor deployment planning for unattended ground sensor networks , 2004, SPIE Defense + Commercial Sensing.
[16] Hongyan Cui,et al. Smart Decision Making Internal Attacks in Wireless Sensor Network , 2012 .
[17] B. Friedlander. A passive localization algorithm and its accuracy analysis , 1987 .
[18] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[19] K. C. Ho,et al. A simple and efficient estimator for hyperbolic location , 1994, IEEE Trans. Signal Process..
[20] Dharmendra Sharma,et al. A Taxonomy of Internal Attacks in Wireless Sensor Network , 2012 .
[21] Jessica Staddon,et al. Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.