An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[3] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[4] Anantha Chandrakasan,et al. A framework for energy-scalable communication in high-density wireless networks , 2002, ISLPED '02.
[5] Vasant Honavar,et al. Automated discovery of concise predictive rules for intrusion detection , 2002, J. Syst. Softw..
[6] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[7] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[8] Shivakant Mishra,et al. Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.
[9] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[10] Ramesh C. Agarwal,et al. PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection) , 2001, SDM.
[11] Nathan Ickes,et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.
[12] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[13] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[14] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[15] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[16] Andreas Willig,et al. Protocols and Architectures for Wireless Sensor Networks , 2005 .
[17] Li Qing,et al. Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..
[18] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[19] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[20] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[21] Yau-Hwang Kuo,et al. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.
[22] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[23] Sajal K. Das,et al. Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[24] Harald Vogt,et al. Autonomous and distributed node recovery in wireless sensor networks , 2006, SASN '06.