Proposing a Behavior-Based IDS Model for IoT Environment
暂无分享,去创建一个
[1] Helena Rifà-Pous,et al. Attack Classification Schema for Smart City WSNs , 2017, Sensors.
[2] Liu Yong-Min,et al. The Architecture and Characteristics of Wireless Sensor Network , 2009, 2009 International Conference on Computer Technology and Development.
[3] Nisha S. Raote. Defending Wormhole Attack in Wireless Ad-hoc Network , 2011 .
[4] Said Bouchkaren,et al. 6lo Technology for Smart Cities Development:Security Case Study , 2014 .
[5] Parminder Singh,et al. Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack , 2014 .
[6] Shahriar Mohammadi,et al. A Comparison of Physical Attacks on Wireless Sensor Networks , 2011 .
[7] Samy El-Tawab,et al. IoT security attacks using reverse engineering methods on WSN applications , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[8] Venkatachalam Subramanian. Proximity-based attacks in wireless sensor networks , 2013 .
[9] Punit Sharma,et al. A Taxonomy of Physical Layer Attacks in MANET , 2015 .
[10] Abdul Hanan Abdullah,et al. Security Issues and Attacks in Wireless Sensor Network , 2014 .
[11] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[12] Hüseyin Arslan,et al. A survey: Spoofing attacks in physical layer security , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).
[13] Zeljko Hocenski,et al. Network performance evaluation of latest windows operating systems , 2012, SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks.
[14] Monika Sachdeva,et al. Detection of Hello Flood Attack on LEACH in Wireless Sensor Networks , 2018 .
[15] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[16] Martine Bellaïche,et al. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing , 2017, Future Internet.
[17] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[18] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[19] Reza Ebrahimi Atani,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.
[20] Akshai Aggarwal,et al. Wormhole Attacks and Countermeasures in Wireless Sensor Networks : A Survey , 2017 .
[21] Debashis De,et al. Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.
[22] Teodor-Grigore Lupu,et al. Main types of attacks in wireless sensor networks , 2009 .
[23] Naser Alajmi,et al. Wireless Sensor Networks Attacks and Solutions , 2014, ArXiv.
[24] Goran Martinović,et al. Quality of Service in Wireless Sensor Networks: A Survey and Related Patents , 2011 .
[25] Pavel Loskot,et al. Common Metrics for Analyzing, Developing and Managing Telecommunication Networks , 2017, ArXiv.
[26] Pavan Pongle,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[27] Vishnu Pratap Singh Kirar. A Survey of Attacks and Security Requirements in Wireless Sensor Networks , 2015 .
[28] Pablo Sanchez,et al. Simulation of Attacks for Security in Wireless Sensor Network , 2016, Sensors.
[29] Maruf Pasha,et al. A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.
[30] Vasco Pereira. Performance Measurement in Wireless Sensor Networks , 2016 .