Securing Wireless Ad Hoc Networks: State of the Art and Challenges
暂无分享,去创建一个
[1] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[2] Seung Jo Han,et al. A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.
[3] Antonio Pescapè,et al. Challenges in Second-Generation Wireless Mesh Networks , 2008, EURASIP J. Wirel. Commun. Netw..
[4] H. S. Ng,et al. Security issues of wireless sensor networks in healthcare applications , 2006 .
[5] Tammy Esteves,et al. Reaching Citizen 2.0: How Government Uses Social Media to Send Public Messages during Times of Calm and Times of Crisis , 2012 .
[6] Raj Sharman,et al. Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .
[7] Maria Grazia Fugini,et al. Information Security Policies and Actions in Modern Integrated Systems , 2004 .
[8] Pietro Michiardi,et al. Security in ad hoc networks , 2003 .
[9] Anupam Joshi,et al. Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..
[10] Yu Liu,et al. A framework for intrusion detection systems by social network analysis methods in ad hoc networks , 2009, Secur. Commun. Networks.
[11] Saurabh Bagchi,et al. Multigrade security monitoring for ad-hoc wireless networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[12] Ajay Gupta,et al. Anomaly intrusion detection in wireless sensor networks , 2006, J. High Speed Networks.
[13] Ivan Stojmenovic,et al. Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.
[14] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[15] Z. Li,et al. IEEE 802.16: History, status and future trends , 2010, Comput. Commun..
[16] Bazara I. A. Barry. Intrusion detection with OMNeT , 2009, SIMUTools 2009.
[17] Christos Douligeris,et al. LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.
[18] Phillip A. Porras. Directions in Network-Based Security Monitoring , 2009, IEEE Security & Privacy Magazine.
[19] Felix C. Freiling,et al. Intrusion Detection in Wireless Sensor Networks , 2009 .
[20] William H. Robinson,et al. A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.
[21] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[22] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[23] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[24] Felix C. Freiling,et al. Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .
[25] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[26] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[27] Joel J. P. C. Rodrigues,et al. Application of Wireless Sensor Networks to Healthcare Promotion , 2008 .
[28] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[29] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[30] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[31] Zonghua Zhang,et al. RADAR: A reputation-driven anomaly detection system for wireless mesh networks , 2010, Wirel. Networks.
[32] Lin Chen,et al. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.
[33] Sencun Zhu,et al. Editorial for special issue on privacy and security in wireless sensorand ad hoc networks , 2009, Ad Hoc Networks.
[34] Timothy W. Finin,et al. Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[35] Marco Carvalho. Security in Mobile Ad Hoc Networks , 2008, IEEE Security & Privacy.
[36] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[37] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[38] Reihaneh Safavi-Naini,et al. Securing wireless sensor networks against large-scale node capture attacks , 2010, ASIACCS '10.
[39] Anupam Joshi,et al. On Intrusion Detection in Mobile Ad Hoc Networks , 2004 .
[40] Satria Mandala,et al. A survey on MANET intrusion detection , 2008 .
[41] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[42] Mike Burmester,et al. On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.
[43] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[44] Saswati Sarkar,et al. A Statistical Framework for Intrusion Detection in Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[45] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[46] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[47] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[48] Wendi B. Heinzelman,et al. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.
[49] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[50] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[51] Reza Manabi,et al. Risk Assessment Using AHP in a Petrochemical Engineering Case Study , 2013 .
[52] Paulo Veríssimo,et al. Information Assurance Technology Forecast 2008 , 2008, IEEE Security & Privacy Magazine.
[53] Jing Zhao,et al. IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[54] Su Peng,et al. Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[55] Sajal K. Das,et al. Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory , 2009, TOSN.
[56] S. Shankar Sastry,et al. Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems , 2009, Ad Hoc Networks.
[57] Murray E. Jennex,et al. Managing Crises and Disasters with Emerging Technologies: Advancements , 2012 .
[58] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[59] Ali Movaghar-Rahimabadi,et al. Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.
[60] Farrukh Aslam Khan,et al. Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.
[61] Christian Callegari,et al. New statistical approaches for anomaly detection , 2009, Secur. Commun. Networks.
[62] Rung Ching Chen,et al. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.
[63] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[64] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .