Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks
release_qvjzf2s5hvb2vc7feffnku2sxi
by
Sunil Gupta, Harsh Verma, A Sangal
References
NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.Showing 1 - 30 of 34 references (in 180ms) | ||
---|---|---|
[b0] via fuzzy |
Masquerade detection using truncated command lines
R.A. Maxion, T.N. Townsend Dependable Systems and Networks doi:10.1109/dsn.2002.1028903 dblp:conf/dsn/MaxionT02 |
web.archive.org [PDF]
|
[b1] via fuzzy |
Recursive data mining for masquerade detection and author identification
B.K. Szymanski, Yongqiang Zhang Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. unpublished doi:10.1109/iaw.2004.1437848 |
web.archive.org [PDF]
|
[b2] via fuzzy |
Penetration state transition analysis: A rule-based intrusion detection approach
P.A. Porras, R.A. Kemmerer Annual Computer Security Applications Conference doi:10.1109/csac.1992.228217 dblp:conf/acsac/PorrasK92 | |
[b3] via fatcat |
A Pattern Matching Model for Misuse Intrusion Detection
Sandeep Kumar , Eugene Spafford 1994 | |
[b4] via fuzzy |
NetSTAT: a network-based intrusion detection approach
G. Vigna, R.A. Kemmerer Annual Computer Security Applications Conference doi:10.1109/csac.1998.738566 dblp:conf/acsac/VignaK98 |
web.archive.org [PDF]
|
[b5] via fatcat |
Annual Computer Security Applications Conference (ACSAC)
1998 | |
[b6] via fuzzy |
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
C. Ko, M. Ruschitzka, K. Levitt IEEE Symposium on Security and Privacy doi:10.1109/secpri.1997.601332 dblp:conf/sp/KoRL97 |
web.archive.org [PDF]
|
[b7] via fuzzy |
Detecting anomalous and unknown intrusions against programs
A.K. Ghosh, J. Wanken, F. Charron Annual Computer Security Applications Conference doi:10.1109/csac.1998.738646 dblp:conf/acsac/GoshWC98 |
web.archive.org [PDF]
|
[b8] via fuzzy |
Intrusion detection. Applying machine learning to Solaris audit data
D. Endler Annual Computer Security Applications Conference doi:10.1109/csac.1998.738647 dblp:conf/acsac/Endler98 |
web.archive.org [PDF]
|
[b9] via fatcat |
Wireless Sensor Networks: A Survey
I Akyildiz , W Su , Y Sankarasubramaniam , E Cayirci 2002 volume:38 | |
[b10] via fatcat |
Wireless sensor network survey
J Yick , B Mukherjee , D Ghosal 2008 volume:52 | |
[b11] via fatcat |
Sensor Networks: An Overview
M Tubaishat , S Madria 2003 volume:22 | |
[b12] via fatcat |
Wireless Sensor Network Security: A Survey
J Walters , Z Liang , W Shi , V Chaudhary 2007 volume:17 | |
[b13] via fuzzy |
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof, D. Wagner Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003. unpublished doi:10.1109/snpa.2003.1203362 |
web.archive.org [PDF]
|
[b14] via fuzzy |
Sensor network security: a survey
Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou 2009 IEEE Communications Surveys and Tutorials doi:10.1109/surv.2009.090205 |
web.archive.org [PDF]
|
[b15] via fatcat |
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
D Boyle , T Newe 2007 | |
[b16] via fatcat |
A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks
H Alwan , A Agarwal 2009 | |
[b17] via fuzzy |
A survey of security issues in wireless sensor networks
Yong Wang, Garhan Attebury, Byrav Ramamurthy 2006 IEEE Communications Surveys and Tutorials doi:10.1109/comst.2006.315852 |
web.archive.org [PDF]
|
[b18] via fuzzy |
A survey on jamming attacks and countermeasures in WSNs
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati Pantziou 2009 IEEE Communications Surveys and Tutorials doi:10.1109/surv.2009.090404 | |
[b19] via fatcat |
Algorithmic Models for Sensor Networks
R Schmid1 , Wattenhofer 2006 | |
[b20] via fatcat |
Algorithmic Models of Interference in Wireless Ad Hoc and Sensor Networks
P Von Rickenbach , R Wattenhofer , A Zollinger 2009 volume:17 | |
[b21] via fatcat |
Reliable Distributed Computing on Unreliable Radio Channels (Extended Abstract)
S Dolev , S Gilbert , R Guerraoui , C Newport , F Kuhn , N Lynch , D Kowalski 2009 | |
[b22] via fatcat |
MobiHoc S3 Workshop on MobiHoc S3
2009 | |
[b23] via fatcat |
Sensor Networks" from a Systems Perspective
B Raman , K Chebrolu 2008 volume:38 | |
[b24] via fuzzy |
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
G. Chockler, M. Demirbas, S. Gilbert, N. Lynch, C. Newport, T. Nolte International Conference on Distributed Computing Systems (ICDCS) - Workshops doi:10.1109/icdcsw.2005.120 dblp:conf/icdcsw/ChocklerDGLNN05 |
web.archive.org [PDF]
|
[b25] via fatcat |
Performance Measurements of Motes Sensor Networks
G Anastasi , A Falchi , A Passarella , M Conti , E Gregori 2004 | |
[b26] via fuzzy |
Telos: enabling ultra-low power wireless research
J. Polastre, R. Szewczyk, D. Culler International Symposium on Information Processing in Sensor Networks doi:10.1109/ipsn.2005.1440950 dblp:conf/ipsn/PolastreSC05 |
web.archive.org [PDF]
|
[b27] via fuzzy |
Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes
Brendan Cody-Kenny, David Guerin, Desmond Ennis, Ricardo Simon Carbajo, Meriel Huggard, Ciaran Mc Goldrick 2009 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems doi:10.1145/1641913.1641917 dblp:conf/mswim/Cody-KennyGECHG09 | |
[b28] via fuzzy |
Energy-efficient communication protocol for wireless microsensor networks
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan Hawaii International Conference on System Sciences doi:10.1109/hicss.2000.926982 dblp:conf/hicss/HeinzelmanCB00 |
web.archive.org [PDF]
|
[b29] via fuzzy |
Medium Access Control protocols for ad hoc wireless networks: A survey
Sunil Kumar, Vineet S. Raghavan, Jing Deng 2006 Ad hoc networks doi:10.1016/j.adhoc.2004.10.001 |
web.archive.org [PDF]
|
|