A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks
暂无分享,去创建一个
D. He | N. Chilamkurti | Daojing He | M. Ma | Q. Jiang | Jianfeng Ma | A. Giridhar | Guangjie Han | Jinfang Jiang | Lei Shu | Feng Wang | Youngsook Lee | Jeeyeon Kim | Mingyan D. Liu | P. Kumari | M. Jan | S. Acharya | S. Biswas | MK Mishra | Yan Zhang | Chun Chen | Neeraj Kumar | Jianhua Chen | Cheng-Chi Lee | Syed A. Rahman | P. Nanda | Muhammad Usman | Woongryul Jeon | Guangsong Li | Y. Zhang | Qi Jiang | De-biao He
[1] V Kantharaju,et al. A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks , 2017 .
[2] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[3] Mohsen Guizani,et al. An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[4] T. Khoshgoftaar,et al. Intrusion detection and Big Heterogeneous Data: a Survey , 2015, Journal of Big Data.
[5] Neeraj Kumar,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2015, Multimedia Systems.
[6] Chunguang Ma,et al. Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..
[7] Mahua Bhattacharya,et al. Automatic Speech Recognition of accented Hindi data , 2014, 2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).
[8] Dawei Zhao,et al. A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2013, Wireless Personal Communications.
[9] Jianfeng Ma,et al. An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks , 2012, Wireless Personal Communications.
[10] G. Appa Rao,et al. Intrusion detection: An energy efficient approach in heterogeneous WSN , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[11] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[12] Chin-Chen Chang,et al. Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[13] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[14] P.R. Kumar,et al. Distributed Clock Synchronization over Wireless Networks: Algorithms and Analysis , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[15] Mingyan Liu,et al. Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[16] Jie Tian,et al. Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage , 2016, Ad Hoc Networks.
[17] Puja Padiya,et al. Feature Selection Based Hybrid Anomaly Intrusion Detection System Using K Means and RBF Kernel Function , 2015 .
[18] E. Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[19] Cheng-Chi Lee,et al. A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..
[20] Dongho Won,et al. Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity , 2012, ITCS.
[21] Safiqul Islam,et al. Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .
[22] Monalisa Mishra,et al. A Two Stage Language Independent Named Entity Recognition for Indian Languages , 2010 .
[23] Chin-Laung Lei,et al. A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS , 2009 .