Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks release_qvjzf2s5hvb2vc7feffnku2sxi

by Sunil Gupta, Harsh Verma, A Sangal

References

NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.
Fuzzy reference matching is a work in progress!
Read more about quality, completeness, and caveats in the fatcat guide.
Showing 1 - 30 of 34 references (in 180ms)
[b0]

via fuzzy
Masquerade detection using truncated command lines
R.A. Maxion, T.N. Townsend
Dependable Systems and Networks
doi:10.1109/dsn.2002.1028903  dblp:conf/dsn/MaxionT02 
web.archive.org [PDF]
[b1]

via fuzzy
Recursive data mining for masquerade detection and author identification
B.K. Szymanski, Yongqiang Zhang
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.  unpublished
doi:10.1109/iaw.2004.1437848 
web.archive.org [PDF]
[b2]

via fuzzy
Penetration state transition analysis: A rule-based intrusion detection approach
P.A. Porras, R.A. Kemmerer
Annual Computer Security Applications Conference
doi:10.1109/csac.1992.228217  dblp:conf/acsac/PorrasK92 
[b3]

via fatcat
A Pattern Matching Model for Misuse Intrusion Detection
Sandeep Kumar , Eugene Spafford
1994  
[b4]

via fuzzy
NetSTAT: a network-based intrusion detection approach
G. Vigna, R.A. Kemmerer
Annual Computer Security Applications Conference
doi:10.1109/csac.1998.738566  dblp:conf/acsac/VignaK98 
web.archive.org [PDF]
[b5]

via fatcat
Annual Computer Security Applications Conference (ACSAC)
1998  
[b6]

via fuzzy
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
C. Ko, M. Ruschitzka, K. Levitt
IEEE Symposium on Security and Privacy
doi:10.1109/secpri.1997.601332  dblp:conf/sp/KoRL97 
web.archive.org [PDF]
[b7]

via fuzzy
Detecting anomalous and unknown intrusions against programs
A.K. Ghosh, J. Wanken, F. Charron
Annual Computer Security Applications Conference
doi:10.1109/csac.1998.738646  dblp:conf/acsac/GoshWC98 
web.archive.org [PDF]
[b8]

via fuzzy
Intrusion detection. Applying machine learning to Solaris audit data
D. Endler
Annual Computer Security Applications Conference
doi:10.1109/csac.1998.738647  dblp:conf/acsac/Endler98 
web.archive.org [PDF]
[b9]

via fatcat
Wireless Sensor Networks: A Survey
I Akyildiz , W Su , Y Sankarasubramaniam , E Cayirci
2002  
volume:38 
[b10]

via fatcat
Wireless sensor network survey
J Yick , B Mukherjee , D Ghosal
2008  
volume:52 
[b11]

via fatcat
Sensor Networks: An Overview
M Tubaishat , S Madria
2003  
volume:22 
[b12]

via fatcat
Wireless Sensor Network Security: A Survey
J Walters , Z Liang , W Shi , V Chaudhary
2007  
volume:17 
[b13]

via fuzzy
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof, D. Wagner
Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.  unpublished
doi:10.1109/snpa.2003.1203362 
web.archive.org [PDF]
[b14]

via fuzzy
Sensor network security: a survey
Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
2009   IEEE Communications Surveys and Tutorials
doi:10.1109/surv.2009.090205 
web.archive.org [PDF]
[b15]

via fatcat
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
D Boyle , T Newe
2007  
[b16]

via fatcat
A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks
H Alwan , A Agarwal
2009  
[b17]

via fuzzy
A survey of security issues in wireless sensor networks
Yong Wang, Garhan Attebury, Byrav Ramamurthy
2006   IEEE Communications Surveys and Tutorials
doi:10.1109/comst.2006.315852 
web.archive.org [PDF]
[b18]

via fuzzy
A survey on jamming attacks and countermeasures in WSNs
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati Pantziou
2009   IEEE Communications Surveys and Tutorials
doi:10.1109/surv.2009.090404 
[b19]

via fatcat
Algorithmic Models for Sensor Networks
R Schmid1 , Wattenhofer
2006  
[b20]

via fatcat
Algorithmic Models of Interference in Wireless Ad Hoc and Sensor Networks
P Von Rickenbach , R Wattenhofer , A Zollinger
2009  
volume:17 
[b21]

via fatcat
Reliable Distributed Computing on Unreliable Radio Channels (Extended Abstract)
S Dolev , S Gilbert , R Guerraoui , C Newport , F Kuhn , N Lynch , D Kowalski
2009  
[b22]

via fatcat
MobiHoc S3 Workshop on MobiHoc S3
2009  
[b23]

via fatcat
Sensor Networks" from a Systems Perspective
B Raman , K Chebrolu
2008  
volume:38 
[b24]

via fuzzy
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
G. Chockler, M. Demirbas, S. Gilbert, N. Lynch, C. Newport, T. Nolte
International Conference on Distributed Computing Systems (ICDCS) - Workshops
doi:10.1109/icdcsw.2005.120  dblp:conf/icdcsw/ChocklerDGLNN05 
web.archive.org [PDF]
[b25]

via fatcat
Performance Measurements of Motes Sensor Networks
G Anastasi , A Falchi , A Passarella , M Conti , E Gregori
2004  
[b26]

via fuzzy
Telos: enabling ultra-low power wireless research
J. Polastre, R. Szewczyk, D. Culler
International Symposium on Information Processing in Sensor Networks
doi:10.1109/ipsn.2005.1440950  dblp:conf/ipsn/PolastreSC05 
web.archive.org [PDF]
[b27]

via fuzzy
Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes
Brendan Cody-Kenny, David Guerin, Desmond Ennis, Ricardo Simon Carbajo, Meriel Huggard, Ciaran Mc Goldrick
2009   International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
doi:10.1145/1641913.1641917  dblp:conf/mswim/Cody-KennyGECHG09 
[b28]

via fuzzy
Energy-efficient communication protocol for wireless microsensor networks
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan
Hawaii International Conference on System Sciences
doi:10.1109/hicss.2000.926982  dblp:conf/hicss/HeinzelmanCB00 
web.archive.org [PDF]
[b29]

via fuzzy
Medium Access Control protocols for ad hoc wireless networks: A survey
Sunil Kumar, Vineet S. Raghavan, Jing Deng
2006   Ad hoc networks
doi:10.1016/j.adhoc.2004.10.001 
web.archive.org [PDF]
Showing 1 - 30 of 34 references  next »