Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks release_qvjzf2s5hvb2vc7feffnku2sxi

by Sunil Gupta, Harsh Verma, A Sangal


NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.
Fuzzy reference matching is a work in progress!
Read more about quality, completeness, and caveats in the fatcat guide.
Showing 1 - 30 of 34 references (in 180ms)

via fuzzy
Masquerade detection using truncated command lines
R.A. Maxion, T.N. Townsend
Dependable Systems and Networks
doi:10.1109/dsn.2002.1028903  dblp:conf/dsn/MaxionT02 [PDF]

via fuzzy
Recursive data mining for masquerade detection and author identification
B.K. Szymanski, Yongqiang Zhang
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.  unpublished
doi:10.1109/iaw.2004.1437848 [PDF]

via fuzzy
Penetration state transition analysis: A rule-based intrusion detection approach
P.A. Porras, R.A. Kemmerer
Annual Computer Security Applications Conference
doi:10.1109/csac.1992.228217  dblp:conf/acsac/PorrasK92 

via fatcat
A Pattern Matching Model for Misuse Intrusion Detection
Sandeep Kumar , Eugene Spafford

via fuzzy
NetSTAT: a network-based intrusion detection approach
G. Vigna, R.A. Kemmerer
Annual Computer Security Applications Conference
doi:10.1109/csac.1998.738566  dblp:conf/acsac/VignaK98 [PDF]

via fatcat
Annual Computer Security Applications Conference (ACSAC)

via fuzzy
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
C. Ko, M. Ruschitzka, K. Levitt
IEEE Symposium on Security and Privacy
doi:10.1109/secpri.1997.601332  dblp:conf/sp/KoRL97 [PDF]

via fuzzy
Detecting anomalous and unknown intrusions against programs
A.K. Ghosh, J. Wanken, F. Charron
Annual Computer Security Applications Conference
doi:10.1109/csac.1998.738646  dblp:conf/acsac/GoshWC98 [PDF]

via fuzzy
Intrusion detection. Applying machine learning to Solaris audit data
D. Endler
Annual Computer Security Applications Conference
doi:10.1109/csac.1998.738647  dblp:conf/acsac/Endler98 [PDF]

via fatcat
Wireless Sensor Networks: A Survey
I Akyildiz , W Su , Y Sankarasubramaniam , E Cayirci

via fatcat
Wireless sensor network survey
J Yick , B Mukherjee , D Ghosal

via fatcat
Sensor Networks: An Overview
M Tubaishat , S Madria

via fatcat
Wireless Sensor Network Security: A Survey
J Walters , Z Liang , W Shi , V Chaudhary

via fuzzy
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof, D. Wagner
Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.  unpublished
doi:10.1109/snpa.2003.1203362 [PDF]

via fuzzy
Sensor network security: a survey
Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
2009   IEEE Communications Surveys and Tutorials
doi:10.1109/surv.2009.090205 [PDF]

via fatcat
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
D Boyle , T Newe

via fatcat
A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks
H Alwan , A Agarwal

via fuzzy
A survey of security issues in wireless sensor networks
Yong Wang, Garhan Attebury, Byrav Ramamurthy
2006   IEEE Communications Surveys and Tutorials
doi:10.1109/comst.2006.315852 [PDF]

via fuzzy
A survey on jamming attacks and countermeasures in WSNs
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati Pantziou
2009   IEEE Communications Surveys and Tutorials

via fatcat
Algorithmic Models for Sensor Networks
R Schmid1 , Wattenhofer

via fatcat
Algorithmic Models of Interference in Wireless Ad Hoc and Sensor Networks
P Von Rickenbach , R Wattenhofer , A Zollinger

via fatcat
Reliable Distributed Computing on Unreliable Radio Channels (Extended Abstract)
S Dolev , S Gilbert , R Guerraoui , C Newport , F Kuhn , N Lynch , D Kowalski

via fatcat
MobiHoc S3 Workshop on MobiHoc S3

via fatcat
Sensor Networks" from a Systems Perspective
B Raman , K Chebrolu

via fuzzy
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
G. Chockler, M. Demirbas, S. Gilbert, N. Lynch, C. Newport, T. Nolte
International Conference on Distributed Computing Systems (ICDCS) - Workshops
doi:10.1109/icdcsw.2005.120  dblp:conf/icdcsw/ChocklerDGLNN05 [PDF]

via fatcat
Performance Measurements of Motes Sensor Networks
G Anastasi , A Falchi , A Passarella , M Conti , E Gregori

via fuzzy
Telos: enabling ultra-low power wireless research
J. Polastre, R. Szewczyk, D. Culler
International Symposium on Information Processing in Sensor Networks
doi:10.1109/ipsn.2005.1440950  dblp:conf/ipsn/PolastreSC05 [PDF]

via fuzzy
Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes
Brendan Cody-Kenny, David Guerin, Desmond Ennis, Ricardo Simon Carbajo, Meriel Huggard, Ciaran Mc Goldrick
2009   International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
doi:10.1145/1641913.1641917  dblp:conf/mswim/Cody-KennyGECHG09 

via fuzzy
Energy-efficient communication protocol for wireless microsensor networks
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan
Hawaii International Conference on System Sciences
doi:10.1109/hicss.2000.926982  dblp:conf/hicss/HeinzelmanCB00 [PDF]

via fuzzy
Medium Access Control protocols for ad hoc wireless networks: A survey
Sunil Kumar, Vineet S. Raghavan, Jing Deng
2006   Ad hoc networks
doi:10.1016/j.adhoc.2004.10.001 [PDF]
Showing 1 - 30 of 34 references  next »