1 |
S.H. Jokhio, I.A. Jokhio, and A.H. Kemp, "Node Capture Attack Detection and Defence in Wireless Sensor Networks," IET Wireless Sensor Syst., vol. 2, no. 3, Sept. 2012, pp. 161-169.
DOI
|
2 |
M. Conti, R.D. Pietro, and A. Spognardi, "Clonewars: Distributed Detection of Clone Attacks in Mobile WSNs," J. Comput. Syst. Sci., vol. 80, no. 3, May 2014, pp. 654-669.
DOI
|
3 |
H. Shafiei et al., "Detection and Mitigation of Dink Hole Sttacks in Wireless Sensor Networks," J. Comput, Syst. Sci., vol. 80, no. 3, May 2014, pp. 644-653.
DOI
|
4 |
A. Abduvaliyev et al., "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks," IEEE Commun. Surveys Tuts., vol. 15, no. 3, 2013, pp. 1223-1237.
DOI
|
5 |
S. Shamsh and V. Dubey, "Roaming Honeypots along with IDS in Mobile Ad-Hoc Networks," Int. J. Comput. Appl., vol. 69, no. 23, May 2013.
|
6 |
M.A. Rassam, A. Zaina, and M.A. Maarof, "Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: a Survey and Open Issues," Sensors, vol. 13, no. 8, 2013, pp. 10087-10122.
DOI
|
7 |
G. Han et al., "IDSEP: a Novel Intrusion Detection Scheme Based on Energy Prediction in Cluster-based Wireless Sensor Networks," IET Inform. Security, vol. 7, no. 2, June 2013, pp. 97-105.
DOI
|
8 |
S. Shamshirband et al., "D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks," Meas., vol, 55, Sept. 2014, pp. 212-226.
DOI
|
9 |
P. Abduvaliyev et al., "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks," IEEE Commun. Surveys Tuts., vol. 15, no. 3, 2013, pp. 1223-1237.
DOI
|
10 |
S.S. Bhojannawar, C.M. Bulla, and V.M. Danawade, "Anomaly Detection Techniques for Wireless Sensor Networks - a Survey," Int. J. Adv. Res. Comput. Commun. Eng., vol. 2, no. 10, Oct. 2013.
|
11 |
A. Canovas et al., "Web Spider Defense Technique in Wireless Sensor Networks," Int. J. Distrib. Sensor Netw., vol. 10, no. 7, July 2014, pp. 1-7.
|
12 |
Network Simulator. http:///www.isi.edu/nsnam/ns
|
13 |
E. Karapistoli and A.A. Economides, "ADLU: a Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks," EURASIP J. Inform. Security, vol. 2014, no. 3, 2014.
|
14 |
F. Bao et al., "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE Trans. Netw. Service Manag., vol. 9, no. 2, June 2012, pp. 169-183.
DOI
|
15 |
B. Sun et al., "Anomaly Detection Based Secure In-network Aggregation for Wireless Sensor Networks," IEEE Syst. J., vol. 7, no. 1, Mar. 2013, pp. 13-25.
DOI
|
16 |
M. Xie, J. Hu, and S. Guo, "Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, Feb. 2013, pp. 574-583.
DOI
|