Intrusion detection system in Wireless Sensor Network based on mobile agent
暂无分享,去创建一个
Rachid Latif | Hicham Zougagh | Ahmed Toumanari | Anouar Bouirden | Yousef El Mourabit | R. Latif | A. Toumanari | H. Zougagh | Yousef El Mourabit | Anouar Bouirden | Yousef El Mourabit
[1] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[2] Giancarlo Fortino,et al. A Java-Based Agent Platform for Programming Wireless Sensor Networks , 2011, Comput. J..
[3] George P. Schell,et al. Universities marginalize online courses , 2004, CACM.
[4] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[6] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[7] Peter J. Denning,et al. Internet Besieged: Countering Cyberspace Scofflaws , 1997 .
[8] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[9] Amparo Alonso-Betanzos,et al. A Snort-based agent for a JADE multi-agent intrusion detection system , 2009, Int. J. Intell. Inf. Database Syst..
[10] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[11] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.