PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks
暂无分享,去创建一个
Sanjaya Kumar Panda | Umashankar Ghugar | Jayaram Pradhan | Sourav Kumar Bhoi | S. K. Panda | Rashmi Ranjan Sahoo | J. Pradhan | R. R. Sahoo | Umashankar Ghugar
[1] C. P. Katti,et al. Security architectures in wireless sensor network , 2020 .
[2] Bashir Alam,et al. Zonal based approach for clustering in heterogeneous WSN , 2017 .
[3] Prasanta K. Jana,et al. An Efficient Task Consolidation Algorithm for Cloud Computing Systems , 2016, ICDCIT.
[4] Prasanta K. Jana,et al. A multi-objective task scheduling algorithm for heterogeneous multi-cloud environment , 2015, 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV).
[5] Prasanta K. Jana,et al. An Efficient Request-Based Virtual Machine Placement Algorithm for Cloud Computing , 2017, ICDCIT.
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[8] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[9] Sunil Kumar Muttoo,et al. Android malware detection: state of the art , 2017, International Journal of Information Technology.
[10] Jitendra Kumar Rout,et al. SFTP : A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET , 2014, ArXiv.
[11] Kuldeep Yadav,et al. Survey of named data networks: future of internet , 2017 .
[12] Xiang Zhou,et al. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.
[13] Alexandre François,et al. Plasmonic Fiber Optic Refractometric Sensors: From Conventional Architectures to Recent Design Trends , 2016, Sensors.
[14] Jingyi Li,et al. A Study of Security Routing Protocol for Wireless Sensor Network , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[15] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[16] Prasanta K. Jana,et al. SLA-based task scheduling algorithms for heterogeneous multi-cloud environment , 2017, The Journal of Supercomputing.
[17] D. K. Lobiyal,et al. Utility-based performance analysis of cross-layer design in multi-flow ad-hoc networks , 2017 .
[18] Prasanta K. Jana,et al. An efficient energy saving task consolidation algorithm for cloud computing systems , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.
[19] M. A. Rassam,et al. A sinkhole attack detection scheme in Mintroute wireless Sensor Networks , 2012, 2012 International Symposium on Telecommunication Technologies.
[20] Anazida Zainal,et al. A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .
[21] M. Azhagiri,et al. A novel approach to measure the quality of cluster and finding intrusions using intrusion unearthing and probability clomp algorithm , 2018 .
[22] Jian Wang,et al. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks , 2017, Sensors.
[23] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[24] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[25] Eryk Dutkiewicz,et al. Impact of static trajectories on localization in wireless sensor networks , 2015, Wirel. Networks.
[26] Xuemin Shen,et al. Trust-based anomaly detection in wireless sensor networks , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).
[27] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[28] Sisi Cao,et al. Rapid, point-of-care, thermally stable paper-based plasmonic assay for Zika virus diagnosis , 2017 .