1 |
A. Stetsko, L. Folkman and V. Matyas, "Neighbor-based Intrusion Detection for Wireless Sensor Networks," Proceedings of 6th International Conference on Wiress and mobile Communications, pp.420-425, 2010
|
2 |
D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part I," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, Vol.24, No.2, pp.274-289, 2006
|
3 |
Y. Liu and K. Han, "Behavior-based Attack Detection and Reporting in Wireless Sensor Networks," Proceedings of the third International Symposiums on Electronic Commerce and Security, pp. 209-212, 2010
|
4 |
K. Chong, "An Improved Algorithm using Shortest Path Tree for Behavior-based Attack Detection and Reporting Problem in Wireless Sensor Networks," Journal of KIISE : Information Networking, vol. 39, no. 4, pp.365-370, August 2012
|
5 |
K. Chong, "Analysis of the Connectivity of Monitoring Nodes annd the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks," Journal of KSCI, vol. 18, no.12, pp. 27-34, 2013
|
6 |
D. Subhadrabandhu, S. Sarkar, and F. Anjum,"A framework for misuse detection in adhoc networks-part II," IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireles Ad Hoc Networks, Vol.24, No.2, pp.290-304, 2006
|
7 |
D.-H. Shin and S. Bagchi, "Optimal monitoring in multi-channel multi-radio wireless mesh network," Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing(Mobihoc), pp. 229-238, 2009
|
8 |
V. Gupta, K. Kapoor and D. S. Renuga, "Wireless Sensor Node Selection Strategies for Effective Surveillance," IEEE International Advanced Computing Conference, pp. 924-929, 2015
|
9 |
R. Asgarnezhad and J. A. Torkestani, "A Survey on Backbone Formation Algorithms for Wireless Sensor Networks," Australian Telecommunication Network and Applications pp. 1-4, 2011
|
10 |
U. Wang, M. Wilkerson, and X. Yu, "Hybrid Sensor Deployment for Surveillance and Target Detection in Wireless Sensor Networks," IEEE , 2011
|
11 |
Y. Wang and Z lun, "Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor Networks," 18th Annual IEEE/ACM Intl. Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 421-423, 2010
|