[1]
|
S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, “A Comparison of Routing Attacks on Wireless Sensor Networks,” International Journal of Information Assur-ance and Security, Vol. 6, No. 3, 2011, pp. 195-215.
|
[2]
|
S. Mohammadi and H. Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks,” In-ternational Journal of Information Security, Vol. 2, No. 2, 2011, pp. 69-84.
|
[3]
|
S. Mohammadi and H. Jadidoleslamy, “A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks,” International Journal of Information Assurance and Security, Vol. 6, 2011, pp. 331-345.
|
[4]
|
B. Krishnamachari, D. Estrin and S. Wicker, “The Impact of Data Aggregation in Wireless Sensor Networks,” International Workshop on Distributed Event-Based Sys-tems, Vienna, July 2002, pp. 457-458.
|
[5]
|
K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” International Journal of Computers and Their Applications, Vol. 1, Special Issue on “Mobile Ad-hoc Networks”, 2010, pp. 42-45.
|
[6]
|
S. Mohammadi and H. Jadidoleslamy, “A Comparison of Physical Attacks on Wireless Sensor Networks,” Interna-tional Journal of Peer to Peer Networks, Vol. 2, No. 2, 2011, pp. 24-42. doi:10.5121/ijp2p.2011.2203
|
[7]
|
M. Saxena, “Security in Wireless Sensor Networks: A Layer-based Classification,” Department of Computer Science, Purdue University, 2011.
https://www.cerias.purdue.edu/apps/reports_and_papers/view/3106
|
[8]
|
T. A. Zia, “A Security Framework for Wireless Sensor Networks,” Doctor of Philosophy (PhD) Thesis, The School of Information Technologies, University of Syd-ney, 2008.
|
[9]
|
A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Pro-ceedings of 7th Annual International Conference on Mo-bile Computing and Networks, Rome, July 2001.
|
[10]
|
Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” Department of Electrical and Computer Engineering, University of Waterloo, Canada, 2011. http://www.cacr.math.uwaterloo.ca/techreports/2008/cacr2008-20.pdf
|
[11]
|
J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Elsevier’s Computer Networks, Vol. 52, No. 12, 2008, pp. 2292-2330.
doi:10.1016/j.comnet.2008.04.002
|
[12]
|
A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN, Department of computer science,” Faculty of Electrical Engineering and Informa-tion Technology, Skopje, 2011.
http://ict-act.org/ICTInntions.../ictinnovations2009_submission_21.pdf
|
[13]
|
C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Pro-ceedings of the 1st IEEE International Workshop on Sen-sor Network Protocols and Applications, Alaska, 11 May 2003, pp. 113-127.
|
[14]
|
R. A. Kemmerer and G. Vigna, “Intrusion Detection: A Brief History and Overview,” Computer Society, Vol. 35, No. 4, 2002, pp. 27-30.
doi:ieeecomputersociety.org/10.1109/MC.2002.10036
|
[15]
|
Ch. Krügel and Th. Toth, “A Survey on Intrusion Detec-tion Systems,” TU Vienna, Austria, 2000.
|
[16]
|
A. K. Jones and R. S. Sielken, “Computer System Intru-sion Detection: A Survey,” University of Virginia, 1999.
|
[17]
|
K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” NIST 800-94, Feb 2007.
|
[18]
|
G. Maselli, L. Deri and S. Suin, “Design and Implemen-tation of an Anomaly Detection System: an Empirical Approach,” University of Pisa, Italy, 2002.
|
[19]
|
S. Northcutt and J. Novak, “Network Intrusion Detection: An Analyst’s Handbook,” New Riders Publishing, Thou-sand Oaks, 2002.
|
[20]
|
V. Chandala, A. Banerjee and V. Kumar, “Anomaly De-tection: A Survey, ACM Computing Surveys,” University of Minnesota, September 2009.
|
[21]
|
J. Molina and M. Cukier, “Evaluating Attack Resiliency for Host Intrusion Detection Systems,” Information As-surance and Security Journal, Vol. 4, 2009. pp. 1-9.
|
[22]
|
S. Zanero and S. M. Savaresi, “Unsupervised Learning Techniques for an Intrusion Detection System,” Proceed-ings of ACM Symposium on Applied Computing, New York, 2004, pp. 412-419. doi:10.1145/967900.967988
|
[23]
|
S. Selliah, “Mobile Agent-Based Attack Resistant Archi-tecture for Distributed Intrusion Detection System,” MSc Thesis, College of Engineering and Mineral Resources at West Virginia University, 2001.
|
[24]
|
O. Depren, M. Topallar, E. narim and M. K. Ciliz, “An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks,” Expert Systems with Applications, Vol. 29, No. 3, 2005, pp. 713-722.
|
[25]
|
V. Handziski, A. K’opke, H. Karl, C. Frank and W. Drytkiewicz, “Improving the Energy Efficiency of Di-rected Diffusion Using Passive Clustering,” Proceedings of 1st European Workshop on Wireless Sensor Networks, Berlin, 2004, pp. 172-187.
|