Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks
暂无分享,去创建一个
[1] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[2] Alessandro Sorniotti,et al. Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .
[3] Paramvir Bahl,et al. Distributed Topology Control for Wireless Multihop Ad-hoc Networks , 2001, INFOCOM.
[4] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[5] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[6] William S. Hortos. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks , 2009, Defense + Commercial Sensing.
[7] William S. Hortos. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks , 2010, Defense + Commercial Sensing.
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Lisa Ann Osadciw,et al. Balancing the performance of a sensor network using an ant system , 2003 .
[10] Ganesh K. Venayagamoorthy,et al. Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.
[11] Stefanos Gritzalis,et al. Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[12] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[13] Qun Li,et al. Three power-aware routing algorithms for sensor networks , 2003, Wirel. Commun. Mob. Comput..
[14] Lisa Ann Osadciw,et al. Sensor Communication Networks Using Swarming Intelligence , 2003 .
[15] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[16] Lisa Ann Osadciw,et al. Robustness of predictive sensor network routing in fading channels , 2005, SPIE Defense + Commercial Sensing.
[17] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[18] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[19] Masayuki Murata,et al. Self-organizing Anti-phase Synchronization Scheme for Sensor Networks Inspired by Frogs ’ Calling Behavior , 2009 .
[20] William S. Hortos,et al. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks , 2007, SPIE Optics East.