1 |
Dorothy E. Denning, 'An Intrusion Detection Model,' in Proceeding of the IEEE Symposium on Security and Privacy., pp.118-131, 1986
|
2 |
W. B. Heinzelman, A. Chandrakasan, and H. Balakrishnan, 'An Application-Specific Protocol Architecture for wireless Microsensor Networks,' IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670, 2002
DOI
ScienceOn
|
3 |
N. Ye and Q. Chen, 'An Anomaly Detection Technique Based on a Chi-square Statistic for Detecting Intrusions into Information System,' Quality and Reliability Engineering International, vol. 17, no. 2, pp. 105-112, 2001
DOI
ScienceOn
|
4 |
D. Wagner, 'Resilent Aggregation in Sensor Networks,' in ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN), pp. 78-97, Oct. 2004
DOI
|
5 |
J. Deng, R. Han, S. Mishra, 'Security Support In-Network Processing in Wireless Networks,' In Proceeding of 1st ACM Workshop on Security of Adhoc and Sensor Networks., 2003
DOI
|
6 |
C. Karlof, and D. Wagner, 'Secure Routing in Wireless Sensor Networks : Attack and Countermeasures,' In Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Application and Procotols., pp. 293-315, Sep. 2003
|
7 |
L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang , 'Preventing Wormhole Attacks in Wireless Ad Hoc Networks,' In IEEE Wireless and Communications and Networking Conference (WCNC)., pp. 1193-1199, Mar. 2005
|
8 |
Y.Zhang and W. Lee, 'Intrusion Detection in Wireless Ad-hoc Networks,' in proceeding of the 6th ACM MobiCom., pp. 275-283, 2000
DOI
|
9 |
Hongmel Deng, Wel LI, and Dharma P. Agrawal, 'Routing Security in Wireless Ad Hoc Networks,' In IEEE Communication magazine., pp. 70-75, Oct. 2002
DOI
ScienceOn
|