Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
暂无分享,去创建一个
[1] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[2] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[3] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[4] Yan Jin,et al. Energy Efficient Non-uniform Clustering Division Scheme in Wireless Sensor Networks , 2008, Wirel. Pers. Commun..
[5] Sungyoung Lee,et al. LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network , 2006, PWC.
[6] Charles P. Pfleeger,et al. Security in computing , 1988 .
[7] S. Papavassiliou,et al. Diagnosing Anomalies and Identifying Faulty Nodes in Sensor Networks , 2007, IEEE Sensors Journal.
[8] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Mohsen Guizani,et al. Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks , 2007, IEEE Transactions on Wireless Communications.
[10] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[11] Jie Wu,et al. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .
[12] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[13] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Peng Jiang,et al. A New Method for Node Fault Detection in Wireless Sensor Networks , 2009, Sensors.
[15] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[16] Ajay Gupta,et al. Lightweight intrusion detection: a second line of defense for unguarded wireless sensor networks , 2007 .
[17] Ossama Younis,et al. Node clustering in wireless sensor networks: recent developments and deployment challenges , 2006, IEEE Network.
[18] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[19] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[20] Yau-Hwang Kuo,et al. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.
[21] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[22] Sungyoung Lee,et al. Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).
[23] Anna Hać,et al. Wireless Sensor Network Designs , 2003 .
[24] Miroslaw Malek,et al. The consensus problem in fault-tolerant computing , 1993, CSUR.
[25] Xiaofan Lin,et al. Analysis of the Reliability and Behavior of Majority and Plurality Voting Systems , 2002 .
[26] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[27] Ning Zhou,et al. Localization anomaly detection for wireless sensor networks , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.