FOR WIRELESS SENSOR NETWORK
暂无分享,去创建一个
Azeddine Bilami | Djallel Eddine Boubiche | A. Bilami | D. Boubiche | D. E. Boubiche | Azeddine Bilami
[1] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[2] Tassos Dimitriou,et al. Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.
[3] Ayman Khalil,et al. Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN , 2010, ArXiv.
[4] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[5] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[6] Luigi Coppolino,et al. Open Issues in IDS Design for Wireless Biomedical Sensor Networks , 2010 .
[7] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[8] J. Meigs,et al. WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.
[9] Marc Dacier,et al. Intrusion detection , 1999, Comput. Networks.
[10] Eui-nam Huh,et al. A lightweight intrusion detection framework for wireless sensor networks , 2010, Wirel. Commun. Mob. Comput..
[11] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[12] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[13] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[14] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[15] Jun Zheng,et al. Wireless Sensor Networks: A Networking Perspective , 2009 .
[16] J. Giedt,et al. Rensselaer Polytechnic Institute , 1960, Nature.
[17] Azeddine Bilami,et al. HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering , 2011, Int. J. Sens. Networks.
[18] Mingbo Xiao,et al. Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[19] Yau-Hwang Kuo,et al. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.
[20] A. Field. Communications , 1963, The Journal of Asian Studies.
[21] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[22] Yoram Singer,et al. A simple, fast, and effective rule learner , 1999, AAAI 1999.
[23] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[24] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[25] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[26] Srdjan Capkun,et al. Secure time synchronization service for sensor networks , 2005, WiSe '05.
[27] Felix C. Freiling,et al. Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .
[28] Deborah Estrin,et al. Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.
[29] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[30] Tassos Dimitriou,et al. Secure In-Network Processing in Sensor Networks , 2005 .