A Survey of Intrusion Detection Systems in Wireless Sensor Networks
暂无分享,去创建一个
[1] Andreas Fuchsberger,et al. Intrusion Detection Systems and Intrusion Prevention Systems , 2005, Inf. Secur. Tech. Rep..
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[4] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[5] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[6] Guiling Wang,et al. Catching Packet Droppers and Modifiers in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Karl N. Levitt,et al. A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[8] Miao Xie,et al. Anomaly Detection in Wireless Sensor Networks , 2013 .
[9] Bo Li,et al. The intrusion detection in mobile sensor network , 2012, TNET.
[10] George Kesidis,et al. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[11] Yufeng Wang,et al. Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks , 2012, Int. J. Secur. Networks.
[12] Calvin Ko,et al. Challenges in intrusion detection for wireless ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[13] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[14] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[15] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[16] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[17] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[18] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[19] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[20] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[21] O. Kachirski,et al. Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.
[22] Ali Miri,et al. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[23] K. Selvakumar,et al. Eaack- A Secure Intrusion Detection System for Manets , 2015 .
[24] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[25] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[26] Min Wei,et al. Intrusion detection scheme using traffic prediction for wireless industrial networks , 2012, Journal of Communications and Networks.
[27] Farrukh Aslam Khan,et al. Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.
[28] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[29] W. Marsden. I and J , 2012 .
[30] Luis A. Trejo,et al. Analyzing Log Files for Postmortem Intrusion Detection , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[31] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[32] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.
[33] Udo W. Pooch,et al. Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.
[34] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[35] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[36] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[37] John A. Clark,et al. Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.
[38] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[39] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[40] Andreas Strikos. A full approach for Intrusion Detection in Wireless Sensor Networks , 2007 .
[41] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[42] Yuan-Cheng Lai,et al. Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems , 2012, IEEE Communications Surveys & Tutorials.
[43] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[44] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[45] Amitabh Mishra,et al. Intrusion detection in MANETS - the second wall of defense , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).
[46] Huwaida Tagelsir Elshoush,et al. Alert correlation in collaborative intelligent intrusion detection systems - A survey , 2011, Appl. Soft Comput..
[47] Bo Sun. Intrusion detection in mobile ad hoc networks , 2004 .
[48] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[49] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[50] Satria Mandala,et al. A survey on MANET intrusion detection , 2008 .
[51] Mona Ghassemian,et al. Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[52] L. Javier García-Villalba,et al. On the Anomaly Intrusion-Detection in Mobile Ad Hoc Network Environments , 2006, PWC.
[53] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[54] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[55] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[56] D. P. Agrawal,et al. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[57] Rung Ching Chen,et al. A new method for intrusion detection on hierarchical wireless sensor networks , 2009, ICUIMC '09.
[58] Marko Jahnke,et al. MITE – MANET Intrusion Detection for Tactical Environments , 2008 .
[59] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[60] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[61] A. Patcha,et al. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[62] Ravi Sankar,et al. A brief survey of access control in Wireless Sensor Networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[63] Neeraj Kumar,et al. Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques , 2016, SoCPaR.
[64] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[65] Dharma P. Agrawal,et al. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[66] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[67] Christopher Leckie,et al. Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..
[68] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[69] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[70] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[71] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.