Anomaly detection in wireless sensor networks: A survey
暂无分享,去创建一个
Biming Tian | Sazia Parvin | Song Han | Miao Xie | Miao Xie | Song Han | B. Tian | S. Parvin
[1] Ayman I. Kayssi,et al. Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[2] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[3] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[4] Shervin Erfani,et al. Survey of multipath routing protocols for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..
[5] Sajal K. Das,et al. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.
[6] Qiang Shen,et al. New Approaches to Fuzzy-Rough Feature Selection , 2009, IEEE Transactions on Fuzzy Systems.
[7] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[8] Hsiao-Hwa Chen,et al. Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.
[9] Zheng Yuan,et al. Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[10] Jingsha He,et al. Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..
[11] Marius Kloft,et al. Automatic feature selection for anomaly detection , 2008, AISec '08.
[12] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[13] Myong-Soon Park,et al. Inside Attacker Detection in Hierarchical Wireless Sensor Network , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[14] Mansoor Alam,et al. Compromised Sensor Nodes Detection: A Quantitative Approach , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[15] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[16] Jianying Zhou,et al. Wireless Sensor Network Security , 2008 .
[17] Kotagiri Ramamohanarao,et al. Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.
[18] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[19] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[20] Daniel Curiac,et al. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).
[21] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[22] Deborah A. Frincke,et al. From intrusion detection to self-protection , 2007, Comput. Networks.
[23] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[24] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[25] Dimitrios Gunopulos,et al. Online outlier detection in sensor data using non-parametric models , 2006, VLDB.
[26] Bo Yu,et al. Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[27] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[28] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[29] Ali Miri,et al. An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[30] Ali Miri,et al. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[31] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[32] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[33] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[34] K. Basu,et al. A non-cooperative game approach for intrusion detection in sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[35] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[36] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[37] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[38] Deborah A. Frincke,et al. Towards survivable intrusion detection system , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[39] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.
[40] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[41] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[42] Miao Xie,et al. Anomaly Detection in Wireless Sensor Networks , 2013 .
[43] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[44] Muhammad Ibrahim,et al. SPINS: Security Protocols for Sensor Networks , 2011 .
[45] Sutharshan Rajasegarar,et al. Anomaly detection by clustering ellipsoids in wireless sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[46] Raman K. Mehra,et al. Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.
[47] Lijun Qian,et al. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..
[48] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[49] Ling Huang,et al. Distributed PCA and Network Anomaly Detection , 2006 .
[50] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[51] Song Han,et al. Taxonomy of Attacks on Wireless Sensor Networks , 2006 .
[52] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[53] John C. Knight,et al. Towards Survivable Intrusion Detection , 2000 .
[54] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .