| 期刊論文1. | Karlof, C.、Wagner, D.(2003)。Secure routing in wireless sensor networks: attacks and countermeasures。Ad Hoc Networks,1(2/3),293-315。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Akyildiz, I. F.、Su, W.、Sankarasubramaniam, Y.、Cayirci, E.(2002)。Wireless sensor networks: A survey。Computer Networks,38(4),393-422。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Qing, L.、Zhu, Q. X.、Wang, M. W.(2006)。Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks。Computer Communications,29(12),2230-2237。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Bhuse, V.、Gupta, A.(2006)。Anomaly intrusion detection in wireless sensor networks。Journal of High Speed Networks,15,33-51。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Du, W.、Deng, J.、Han, Y. S.、Varshney, P.、Katz, J.、Khalili, A.(2005)。A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks。ACM Transactions on Information and System Security (TISSEC),8(2),228-258。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Qing, E.、Perrig, A.(2004)。Designing Secure Sensor Networks。IEEE Wireless Communication,11(6),38-43。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Helmer, G.、Wong, J. S. K.、Honavar, V.、Miller, L.(2002)。Automated discovery of concise predictive rules for intrusion detection。Journal of Systems and Software,60(3),165-175。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Sobh, T. S.(2006)。Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art。Computer Standards and interfaces,28(6),670-694。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Su, W. T.、Chang, K. M.、Kuo, Y. H(2007)。eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks。Computer Networks,51(4),1151-1168。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Agarwal, R.、Joshi M. V.(2001)。PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Min, R.、Chandrakasan, A.(2002)。A Framework for Energy-Scalable Communication in High-Density Wireless Networks36-41。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Onat, I.、Miri, A.(2005)。An Intrusion Detection System for Wireless Sensor Networks253-259。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Perkins, C. E.、Bhagwat, P.(1994)。Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers。The Conference on Communications Architectures, Protocols and Applications,234-244。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Roundy, S.、Steingart, D.、Frechette, L.、Wright, P.、Rabaey, J.(2004)。Power Sources for Wireless Sensor Networks。1st European Workshop on Wireless Sensor Networks,1-17。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Strasser, M.、Vogt, H.(2006)。Autonomous and distributed node recovery in wireless sensor networks113-122。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Shih, E.、Cho, S.、Ickes, N.、Min, R.、Sinha, A.、Wang, A.、Chandrakasan, A.(200107)。Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Networks272-287。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 研究報告1. | Law, Y. W.、Doumen, J.、Hartel, P.(2004)。Survey and Benchmark of Block Ciphers for Wireless Sensor Networks。University of Twente, Computer Science Department。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書1. | Karl, Holger、Willig, Andreas(2005)。Protocols and Architectures for Wireless Sensor Networks。Wiley publications。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Schafer, G.(2003)。Security in Fixed and Wireless Networks - An introduction to Securing Data Communications。John Wiley & Sons。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Schneier, B.(1996)。Applied Cryptography: Protocols, Algorithms and Source Code。C. John Wiley & Sons。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書論文1. | Chadha, A.、Liu, Y.、Das, S. K.(2005)。Group Key Distribution via Local Collaboration in Wireless Sensor Networks。Sensor and Ad Hoc Communications and Networks。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Cordeiro, C. D. M.、Agrawal, D. P.(2006)。Ad Hoc and Sensor Networks - Theory and Applications。World Scientific。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |