LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks
暂无分享,去创建一个
[1] T. V. Lakshman,et al. SRED: stabilized RED , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[2] Sajal K. Das,et al. A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[3] Yaping Li,et al. ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .
[4] Anupam Joshi,et al. Security for wireless sensor networks , 2004 .
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[7] S. Lakshmivarahan,et al. Learning Algorithms Theory and Applications , 1981 .
[8] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[9] B. John Oommen,et al. Discretized learning automata solutions to the capacity assignment problem for prioritized networks , 2002, IEEE Trans. Syst. Man Cybern. Part B.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Mohammad S. Obaidat,et al. Guest editorial learning automata: theory, paradigms, and applications , 2002, IEEE Trans. Syst. Man Cybern. Part B.
[12] Eyal Kushilevitz,et al. Learning Automata , 2008, Encyclopedia of Algorithms.
[13] Mohammad S. Obaidat,et al. A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis , 2008, Simul..
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[16] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[17] S. Banerjee,et al. Intrusion Detection on Sensor Networks Using Emotional Ants , 2005 .
[18] Richard Bellman,et al. ON A ROUTING PROBLEM , 1958 .
[19] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[21] Mohammad S. Obaidat,et al. FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..
[22] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[23] Leonidas J. Guibas,et al. Energy Efficient Intrusion Detection in Camera Sensor Networks , 2007, DCOSS.
[24] Harald Vogt,et al. Intrusion Detection and Failure Recovery in Sensor Nodes , 2005, GI Jahrestagung.
[25] Shivakant Mishra,et al. A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.