Cross Layer–Based Intrusion Detection Techniques in Wireless Networks: A Survey
暂无分享,去创建一个
[1] Sipra Das Bit,et al. A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network , 2011, Comput. Commun..
[2] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[3] William S. Hortos,et al. Combined bio-inspired/evolutionary computational methods in cross-layer protocol optimization for wireless ad hoc sensor networks , 2011, Defense + Commercial Sensing.
[4] Konstantinos G. Kyriakopoulos,et al. Fusing multi-layer metrics for detecting security attacks in 802.11 networks , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[5] Divya Bansal,et al. Distributed cross layer approach for detecting multilayer attacks in wireless multi-hop networks , 2011, 2011 IEEE Symposium on Computers & Informatics.
[6] Bu-Sung Lee,et al. Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.
[7] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[8] Geethapriya Thamilarasu,et al. CIDS: cross-layer intrusion detection system for mobile ad hoc networks , 2009 .
[9] Kamalrulnizam Abu Bakar,et al. Distributed Intrusion Detection in Clouds Using Mobile Agents , 2009, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences.
[10] Daxin Tian,et al. Anomaly Intrusion Detection Methods for Wireless LAN , 2008, 2008 Fourth International Conference on Natural Computation.
[11] Bu-Sung Lee,et al. Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs , 2007, 2007 15th IEEE International Conference on Networks.
[12] Geethapriya Thamilarasu,et al. Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[13] Yih-Chun Hu,et al. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.
[14] William S. Hortos,et al. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks , 2007, SPIE Optics East.
[15] Geethapriya Thamilarasu,et al. Toward Building a Multi-level Robust Intrusion Detection Architecture for Distributed Mobile Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[16] Albert Y. Zomaya,et al. Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[17] Geethapriya Thamilarasu,et al. A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[18] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[19] Hong Man,et al. A distributed cross-layer intrusion detection system forad hoc networks , 2006, Ann. des Télécommunications.
[20] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[21] Sumita Mishra,et al. A cross-layer based intrusion detection approach for wireless ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[22] M. Motani,et al. Cross-layer design: a survey and the road ahead , 2005, IEEE Communications Magazine.
[23] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[24] Panganamala Ramana Kumar,et al. A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.
[25] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[26] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[27] Azeddine Bilami,et al. FOR WIRELESS SENSOR NETWORK , 2012 .
[28] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[29] Hiren Kumar Deva Sarma,et al. Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[30] John S. Baras,et al. Cross-layer attacks in wireless ad hoc networks 1 , 2004 .