1 |
J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless Sensor Network Security: A Survey," Security in Distributed Grid and Pervasive Computing, 2006, pp. 1-50.
|
2 |
김태경, "디렉티드 디퓨젼 기반의 무선 센서 네 트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 31-36.
|
3 |
Liu Y, Li Y and Man H, "MAC Layer Anomaly Detecion in Ad hoc Networks," Proc. of the 6th IEEE Information Assurance Workshop, 2005, pp. 402-409.
|
4 |
Mitrokotsa A. Komninos N. and Douligeris C., "Intrusion Detection with Neural Networks and Watermarking Techniques for MANET," Proceedings of IEEE International Conference on Pervasive Services, 2007, pp. 118-127.
|
5 |
신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제 8권, 제1호, 2012, pp. 125-137.
|
6 |
Mishra, A., Nadkarni, K., and Patcha, A., "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, 2004, pp. 48-60.
|
7 |
A. Stetesko, L. Folkman, and V. Matayas, "Neighborbased Intrusion Detection for Wireless Sensor Network," 6th international Conference on Wireless and Mobile Communicationsm, IEEE, 2010, pp. 420-425.
|
8 |
T. H. Hai, E. N. Huh, and M. Jo, "A Lightweight Intrusion Detection Framework for Wireless Sensor Networks," Wireless Communications and Mobile Computing, Vol. 10, Issue. 4, 2010, pp. 559-572.
|