Cross Layer–Based Intrusion Detection Techniques in Wireless Networks: A Survey

[1]  Sipra Das Bit,et al.  A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network , 2011, Comput. Commun..

[2]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[3]  William S. Hortos,et al.  Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks , 2011, Defense + Commercial Sensing.

[4]  Konstantinos G. Kyriakopoulos,et al.  Fusing multi-layer metrics for detecting security attacks in 802.11 networks , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[5]  Divya Bansal,et al.  Distributed cross layer approach for detecting multilayer attacks in wireless multi-hop networks , 2011, 2011 IEEE Symposium on Computers & Informatics.

[6]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[7]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[8]  Geethapriya Thamilarasu,et al.  CIDS: cross-layer intrusion detection system for mobile ad hoc networks , 2009 .

[9]  Kamalrulnizam Abu Bakar,et al.  Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.

[10]  Daxin Tian,et al.  Anomaly Intrusion Detection Methods for Wireless LAN , 2008, 2008 Fourth International Conference on Natural Computation.

[11]  Bu-Sung Lee,et al.  Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.

[12]  Geethapriya Thamilarasu,et al.  Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[13]  Yih-Chun Hu,et al.  Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.

[14]  William S. Hortos,et al.  Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks , 2007, SPIE Optics East.

[15]  Geethapriya Thamilarasu,et al.  Toward Building a Multi-level Robust Intrusion Detection Architecture for Distributed Mobile Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[16]  Albert Y. Zomaya,et al.  Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[17]  Geethapriya Thamilarasu,et al.  A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[18]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[19]  Hong Man,et al.  A distributed cross-layer intrusion detection system forad hoc networks , 2006, Ann. des Télécommunications.

[20]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[21]  Sumita Mishra,et al.  A cross-layer based intrusion detection approach for wireless ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[22]  M. Motani,et al.  Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.

[23]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[24]  Panganamala Ramana Kumar,et al.  A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.

[25]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[26]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[27]  Azeddine Bilami,et al.  FOR WIRELESS SENSOR NETWORK , 2012 .

[28]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[29]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[30]  John S. Baras,et al.  Cross-layer attacks in wireless ad hoc networks 1 , 2004 .