1 |
A. Stetsko, L. Folkman and V. Matyas, "Neighbor-based Intrusion Detection for Wireless Sensor Networks," Proceedings of 6th International Conference on Wiress and mobile Communications, pp.420-425, 2010
|
2 |
D. Sheela, C. Naveenkumar and G. Mahadevan, "A noncryptographic method of sinkhole attack detection in wireless sensor networks," IEEE Intl. conference on recent trends in Information Technology(ICRTIT 2011), pp. 527-532, 2011
|
3 |
W. T. Zhu, "Node replication attacks in wireless sensor networks : bypassing the neighbor-based detection scheme," Intl. Conference on Network Computing and Information Security, pp. 156-160, 2011
|
4 |
Y. Liu and K. Han, "Behavior-based Attack Detection and Reporting in Wireless Sensor Networks," Proceedings of the third International Symposiums on Electronic Commerce and Security, pp. 209-212, 2010
|
5 |
K. Chong, "An Improved Algorithm using Shortest Path Tree for Behavior-based Attack Detection and Reporting Prblem in Wireless Sensor Networks," Journal of KIISE : Information Netwoking, vol. 39, no. 4, pp.365-370, August 2012
|
6 |
D.-H. Shin and S. Bagchi, "Optimal monitoring in multi-channel multi-radio wireless mesh network," Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing(Mobihoc), pp. 229-238, 2009
|
7 |
D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part I," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, Vol.24, No.2, pp.274-289, 2006
|
8 |
D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part II," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireles Ad Hoc Networks, Vol.24, No.2, pp.290-304, 2006
|
9 |
U. Wang, M. Wilkerson, and X. Yu, "Hybrid Sensor Deployment for Surveillance and Target Detection in Wireless Sensor Networks," IEEE , 2011
|
10 |
Y. Wang and Z lun, "Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks," 18th Annual IEEE/ACM Intl. Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 421-423, 2010
|
11 |
Xue Wang and Sheng Wang, "Hierarchical Deployment optimization for Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 10, no. 7, pp. 1028-1041, July, 2011
DOI
ScienceOn
|
12 |
G. Yang and D. Quio, "Multi-Round Sensor Deployment for Guaranteed Barrier Coverage," IEEE INFOCOM, 2010
|