Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach
暂无分享,去创建一个
[1] Marimuthu Palaniswami,et al. Anomaly detection in wireless sensor networks , 2008, IEEE Wireless Communications.
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Stefanos Gritzalis,et al. Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.
[4] Jeff Rose,et al. MANTIS: system support for multimodAl NeTworks of in-situ sensors , 2003, WSNA '03.
[5] Sachin Shetty,et al. Wireless Sensor Payload Design for Sounding Rocket , 2007, Computers and Their Applications.
[6] Jie Wu,et al. Energy-efficient coverage problems in wireless ad-hoc sensor networks , 2006, Comput. Commun..
[7] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[8] Xun Wang,et al. Lifetime optimization of sensor networks under physical attacks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[9] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[10] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[11] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[12] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[13] Rahul Khanna,et al. Control theoretic approach to intrusion detection using a distributed hidden Markov model , 2008, IEEE Wireless Communications.
[14] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[15] Ratan K. Guha,et al. Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[16] Lalan Kumar,et al. A review on security issues in wireless sensor network , 2010 .
[17] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[18] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[19] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[20] Radha Poovendran,et al. A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[21] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).