Efficient Intrusion Detection Algorithms for Smart Cities-Based Wireless Sensing Technologies
暂无分享,去创建一个
[1] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[2] Siyuan Ma,et al. A Charging Algorithm for the Wireless Rechargeable Sensor Network with Imperfect Charging Channel and Finite Energy Storage , 2019, Sensors.
[3] G. Mahadevan,et al. A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[4] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[5] Shu-Chin Wang,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..
[6] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[7] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[8] G. Umamaheswari,et al. Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.
[9] Ruirui Zhang,et al. Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.
[10] Qiuwei Yang,et al. Survey of Security Technologies on Wireless Sensor Networks , 2015, J. Sensors.
[11] Amita Malik,et al. Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey , 2014, J. Comput. Networks Commun..
[12] Weifa Liang,et al. Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers , 2017, Ad Hoc Networks.
[13] ChooKim-Kwang Raymond,et al. Distributed denial of service (DDoS) resilience in cloud , 2016 .
[14] Rabie A. Ramadan,et al. VEGK: Secure Clustering for Efficient Operation in WSNs , 2013 .
[15] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[16] Tran Duc Chung,et al. Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review , 2020 .
[17] Aline Carneiro Viana,et al. Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.
[18] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[19] Tassos Dimitriou,et al. Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[20] Yongping Zhang,et al. SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks , 2010, 2010 Second International Conference on Computer Modeling and Simulation.
[21] Naixue Xiong,et al. Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.
[22] Riadh Dhaou,et al. Energy-Aware Self-Organization Algorithms for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[23] Dharma P. Agrawal,et al. Routing in Wireless Sensor Networks Using Optimization Techniques: A Survey , 2019, Wireless Personal Communications.
[24] Özgür Saglam,et al. A Self Organizing Multihop Clustering Protocol for Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[25] Milind R. Naphade,et al. Smarter Cities and Their Innovation Challenges , 2011, Computer.
[26] Ala Al-Fuqaha,et al. Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications , 2015, AdHocNets 2015.
[27] Ali Farrokhtala,et al. Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[28] Keqin Li,et al. Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment , 2017, Future Gener. Comput. Syst..
[29] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[30] Riccardo Carotenuto,et al. A Real-Time Decision Platform for the Management of Structures and Infrastructures , 2019, Electronics.
[31] Luigi Coppolino,et al. An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).
[32] Yang Yang,et al. Research of AODV Routing Protocol for Ad Hoc Networks1 , 2013 .
[33] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[34] Min Song,et al. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[35] N. Nithiyanandam,et al. Artificial bee colony based sinkhole detection in wireless sensor networks , 2019, Journal of Ambient Intelligence and Humanized Computing.
[36] Mansoor Ahmed,et al. Smart Cities: A Survey on Security Concerns , 2016 .
[37] Jawahar Arumugam,et al. Clustering Algorithms for Wireless Sensor Networks Survey , 2020 .
[38] Eman Shaaban,et al. Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.
[39] Mohamed Abid,et al. Wireless Sensor Network Design Methodologies: A Survey , 2020, J. Sensors.
[40] Reza Rafeh,et al. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..