SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Containing denial-of-service attacks in broadcast authentication in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
A survey of game-theoretic approaches in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Packet-dropping adversary identification for data plane security
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Proceedings of the 16th ACM conference on Computer and communications security
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Secure feedback service in wireless sensor networks
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Distributed jammer network: impact and characterization
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Security and privacy in emerging wireless networks
IEEE Wireless Communications
Signaling game based strategy of intrusion detection in wireless sensor networks
Computers & Mathematics with Applications
Misuse detection in consent-based networks
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
Detecting disruptive routers in wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
An efficient neighbor knowledge based broadcasting for mobile ad hoc networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
Jamming aware routing for MHWN with dynamic measurement
Computers and Electrical Engineering
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Defending against jamming attacks in wireless local area networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model
Security and Communication Networks
Hi-index | 0.00 |
Host-based intrusion detection systems attempt to identify attacks by discovering program behaviors that deviate from expected patterns. While the idea of performing behavior validation on-the-fly and terminating errant tasks as soon as a violation is ...