:::

詳目顯示

回上一頁
題名:運用多階式入侵偵測於無線感測網路
書刊名:資訊科技國際期刊
作者:陳榮靜 引用關係謝佳奮
出版日期:2008
卷期:2:2
頁次:頁32-49
主題關鍵詞:無線感測網路入侵偵測異常偵測攻擊型態防護方式Wireless sensor networksIntrusion detectionAnomaly detectionAttack typesCountermeasures
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:29
期刊論文
1.Karlof, C.、Wagner, D.(2003)。Secure routing in wireless sensor networks: attacks and countermeasures。Ad Hoc Networks,1(2/3),293-315。  new window
2.Akyildiz, I. F.、Su, W.、Sankarasubramaniam, Y.、Cayirci, E.(2002)。Wireless sensor networks: A survey。Computer Networks,38(4),393-422。  new window
3.Qing, L.、Zhu, Q. X.、Wang, M. W.(2006)。Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks。Computer Communications,29(12),2230-2237。  new window
4.Bhuse, V.、Gupta, A.(2006)。Anomaly intrusion detection in wireless sensor networks。Journal of High Speed Networks,15,33-51。  new window
5.Du, W.、Deng, J.、Han, Y. S.、Varshney, P.、Katz, J.、Khalili, A.(2005)。A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks。ACM Transactions on Information and System Security (TISSEC),8(2),228-258。  new window
6.Qing, E.、Perrig, A.(2004)。Designing Secure Sensor Networks。IEEE Wireless Communication,11(6),38-43。  new window
7.Helmer, G.、Wong, J. S. K.、Honavar, V.、Miller, L.(2002)。Automated discovery of concise predictive rules for intrusion detection。Journal of Systems and Software,60(3),165-175。  new window
8.Sobh, T. S.(2006)。Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art。Computer Standards and interfaces,28(6),670-694。  new window
9.Su, W. T.、Chang, K. M.、Kuo, Y. H(2007)。eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks。Computer Networks,51(4),1151-1168。  new window
會議論文
1.Agarwal, R.、Joshi M. V.(2001)。PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)。  new window
2.Min, R.、Chandrakasan, A.(2002)。A Framework for Energy-Scalable Communication in High-Density Wireless Networks36-41。  new window
3.Onat, I.、Miri, A.(2005)。An Intrusion Detection System for Wireless Sensor Networks253-259。  new window
4.Perkins, C. E.、Bhagwat, P.(1994)。Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers。The Conference on Communications Architectures, Protocols and Applications,234-244。  new window
5.Roundy, S.、Steingart, D.、Frechette, L.、Wright, P.、Rabaey, J.(2004)。Power Sources for Wireless Sensor Networks。1st European Workshop on Wireless Sensor Networks,1-17。  new window
6.Strasser, M.、Vogt, H.(2006)。Autonomous and distributed node recovery in wireless sensor networks113-122。  new window
7.Shih, E.、Cho, S.、Ickes, N.、Min, R.、Sinha, A.、Wang, A.、Chandrakasan, A.(200107)。Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Networks272-287。  new window
研究報告
1.Law, Y. W.、Doumen, J.、Hartel, P.(2004)。Survey and Benchmark of Block Ciphers for Wireless Sensor Networks。University of Twente, Computer Science Department。  new window
圖書
1.Karl, Holger、Willig, Andreas(2005)。Protocols and Architectures for Wireless Sensor Networks。Wiley publications。  new window
2.Schafer, G.(2003)。Security in Fixed and Wireless Networks - An introduction to Securing Data Communications。John Wiley & Sons。  new window
3.Schneier, B.(1996)。Applied Cryptography: Protocols, Algorithms and Source Code。C. John Wiley & Sons。  new window
圖書論文
1.Chadha, A.、Liu, Y.、Das, S. K.(2005)。Group Key Distribution via Local Collaboration in Wireless Sensor Networks。Sensor and Ad Hoc Communications and Networks。  new window
2.Cordeiro, C. D. M.、Agrawal, D. P.(2006)。Ad Hoc and Sensor Networks - Theory and Applications。World Scientific。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top