标题
Detecting Malicious Data Injections in Wireless Sensor Networks
作者
关键词
-
出版物
ACM COMPUTING SURVEYS
Volume 48, Issue 2, Pages 1-33
出版商
Association for Computing Machinery (ACM)
发表日期
2015-10-14
DOI
10.1145/2818184
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
- (2015) Mohsen Rezvani et al. IEEE Transactions on Dependable and Secure Computing
- Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact
- (2014) Sankardas Roy et al. IEEE Transactions on Information Forensics and Security
- Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues
- (2013) Murad Rassam et al. SENSORS
- Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
- (2012) Bo Sun et al. IEEE Systems Journal
- A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks
- (2012) Yan Sun et al. IEEE Transactions on Dependable and Secure Computing
- Statistics-based outlier detection for wireless sensor networks
- (2012) Y. Zhang et al. INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE
- Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
- (2012) Fenye Bao et al. IEEE Transactions on Network and Service Management
- Anomaly detection in wireless sensor networks: A survey
- (2011) Miao Xie et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
- (2011) Yanli Yu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Elliptical anomalies in wireless sensor networks
- (2010) Sutharshan Rajasegarar et al. ACM Transactions on Sensor Networks
- Sensor faults
- (2010) Abhishek B. Sharma et al. ACM Transactions on Sensor Networks
- Trust management systems for wireless sensor networks: Best practices
- (2010) Javier Lopez et al. COMPUTER COMMUNICATIONS
- Trust management in wireless sensor networks
- (2010) Theodore Zahariadis et al. EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- Secure data aggregation in wireless sensor networks: A comprehensive overview
- (2009) Suat Ozdemir et al. Computer Networks
- Reputation-Enabled Self-Modification for Target Sensing in Wireless Sensor Networks
- (2009) Xue Wang et al. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT
- Secure localization algorithms for wireless sensor networks
- (2008) A. Boukerche et al. IEEE COMMUNICATIONS MAGAZINE
- Anomaly detection in wireless sensor networks
- (2008) S. Rajasegarar et al. IEEE WIRELESS COMMUNICATIONS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationPublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More