Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique
暂无分享,去创建一个
Daniel Curiac | Florin Dragan | Ovidiu Banias | Constantin Volosencu | Octavian Dranga | F. Dragan | O. Dranga | C. Voloşencu | Daniel Curiac | O. Banias
[1] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[2] D. P. Agrawal,et al. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[3] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[4] Joseph R. Cavallaro,et al. Efficient implementation of rotation operations for high performance QRD-RLS filtering , 1997, Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors.
[5] Diran Basmadjian,et al. The Art of Modeling in Science and Engineering with Mathematica , 1999 .
[6] Lang Tong,et al. Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[7] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] Dae-Ki Kang,et al. Learning classifiers for misuse and anomaly detection using a bag of system calls representation , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[10] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[11] Tomasz Bednarz,et al. Discovery of Malicious Nodes in Wireless Sensor Networks Using Neural Predictors , 2007 .
[12] Andrea Vitaletti,et al. Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..
[13] Y. Selen,et al. Model-order selection: a review of information criterion rules , 2004, IEEE Signal Processing Magazine.
[14] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[15] Miodrag Potkonjak,et al. System-architectures for sensor networks issues, alternatives, and directions , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[16] Ricardo Staciarini Puttini,et al. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.