A novel algorithm for malicious attack detection in UWSN
暂无分享,去创建一个
M. Shamim Kaiser | Muhammad R. Ahmed | M. S. Kaiser | Muhammad R. Ahmed | Zamshed I. Chowdhury | Mohammed Aseeri | Nusrat Z. Zenia | M. Aseeri | Z. Chowdhury | N. Z. Zenia
[1] Jessica Staddon,et al. Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.
[3] Yizhong Ma,et al. The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.
[4] Mari Carmen Domingo,et al. Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] Kari Sentz,et al. Combination of Evidence in Dempster-Shafer Theory , 2002 .
[7] Reza Ebrahimpour,et al. Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels , 2012, Expert Syst. Appl..
[8] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[9] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[10] Muhammad R. Ahmed,et al. Markov chain Monte Carlo based internal attack evaluation for wireless sensor network , 2013 .
[11] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[12] Jiejun Kong,et al. The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.
[13] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[14] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[15] Sudip Misra,et al. CURD: Controllable reactive jamming detection in underwater sensor networks , 2014, Pervasive Mob. Comput..
[16] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[17] Subhash Challa,et al. An Introduction to Bayesian and Dempster-Shafer Data Fusion , 2003 .
[18] Ítalo S. Cunha,et al. End-to-end authentication in Under-Water Sensor Networks , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).
[19] Sérgio Cavalcante,et al. An extended approach for Dempster-Shafer theory , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[20] Ahmed Al Ghamdi,et al. A Novel Trust and Reputation Model Based WSN Technology to Secure Border Surveillance , 2013 .
[21] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[22] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[23] Rakowsky Uwe Kay,et al. Fundamentals of the Dempster-Shafer theory and its applications to system safety and reliability modelling , 2007 .
[24] Yenumula B. Reddy,et al. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.