WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
暂无分享,去创建一个
Mousa Al-Akhras | Iman Almomani | Bassam Al Kasasbeh | Iman M. Almomani | M. Al-Akhras | B. Kasasbeh
[1] Chor Ping Low,et al. Energy Neutral Clustering for energy harvesting wireless sensors networks , 2013, ICON.
[2] Jeong-Uk Kim,et al. Study on Intrusion Detection Policy for Wireless Sensor Networks , 2013 .
[3] Gang Hu,et al. Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.
[4] Iman Almomani,et al. Performance analysis of LEACH protocol under Denial of Service attacks , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[7] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[8] Anazida Zainal,et al. A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .
[9] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[10] Jalel Ben-Othman,et al. Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[11] Hoon Oh,et al. An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks , 2013 .
[12] Neeraj Kumar,et al. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[13] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[14] Abdulaziz Omar Alsadhan,et al. A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network , 2013 .
[15] Kok-Keong Loo,et al. Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .
[16] Anush Ananthakumar,et al. Intrusion Detection System in Wireless Sensor Networks: A Review , 2015 .
[17] Jaydip Sen,et al. Security in Wireless Sensor Networks , 2013, ArXiv.
[18] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[19] N. Marriwala,et al. An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.
[20] Valerio Formicola,et al. Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.
[21] Azeddine Bilami,et al. Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[22] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[23] Marco Zennaro,et al. Successful deployment of a Wireless Sensor Network for precision agriculture in Malawi , 2012, NESEA.
[24] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[25] Huafeng Liu,et al. Cluster Number Variability Problem in LEACH , 2006, UIC.
[26] Vijay Laxmi,et al. Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.
[27] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[28] 王淑卿,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .
[29] Dilip Kumar,et al. Performance analysis of energy efficient clustering protocols for maximising lifetime of wireless sensor networks , 2013, IET Wirel. Sens. Syst..
[30] Ian H. Witten,et al. WEKA - Experiences with a Java Open-Source Project , 2010, J. Mach. Learn. Res..
[31] A. P. Renold,et al. Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Communication and Informatics.
[32] Gerhard P. Hancke,et al. Opportunities and Challenges of Wireless Sensor Networks in Smart Grid , 2010, IEEE Transactions on Industrial Electronics.
[33] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[34] Yiming Miao,et al. Cluster-Head Election Algorithm for Wireless Sensor Networks Based on LEACH Protocol , 2015 .
[35] Sandeep Waraich,et al. A Comparative Study on LEACH Routing Protocol and Its Variants in Wireless Sensor Networks: A Survey , 2014 .
[36] Aikaterini Mitrokotsa,et al. Intrusion Detection Techniques in Sensor Networks , 2008 .
[37] Krishan Kumar,et al. Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[38] Hossein Jadidoleslamy,et al. A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable , 2011, Wirel. Sens. Netw..
[39] Ahmed Toumanari,et al. Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection , 2015 .
[40] Said Ben Alla,et al. Hierarchical Adaptive Balanced Routing Protocol for Energy Efficiency in Heterogeneous Wireless Sensor Networks , 2012 .
[41] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .