An Integrated Approach of Intrusion Detection System (IAIDS) for Wireless Sensor Networks
暂无分享,去创建一个
[1] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[2] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[3] Subir Kumar Sarkar,et al. Issues in Wireless Sensor Networks , 2008 .
[4] Baohua Zhao,et al. Compromised Nodes in Wireless Sensor Network , 2006, APWeb Workshops.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[7] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[8] Ranjit Panigrahi,et al. Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures , 2013 .
[9] Hassan H. Soliman,et al. A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks , 2012 .
[10] Peter Mell,et al. Intrusion Detection Systems , 2001 .
[11] Yau-Hwang Kuo,et al. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.
[12] Mohit Saxena,et al. SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .
[13] K.Q. Yan,et al. Hybrid Intrusion Detection System for enhancing the security of a cluster-based Wireless Sensor Network , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[14] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[15] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[16] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[17] Min Song,et al. Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .