[1]
|
بكارگيري اتوماتاهاي يادگير در خنثي كردن حمله ارسال انتخابي در شيكه هاي حسگر بي سيم
|
|
THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING
NULL |
|
|
[2]
|
Security in Communication for Intelligent Wireless Sensor Networks: Issues and Challenges
|
|
… Intelligence for Wireless …,
2022 |
|
|
[3]
|
Battery-less IoT Devices: Energy Source Manipulation Attacks
|
|
2022 |
|
|
[4]
|
Computational Intelligence for Wireless Sensor Networks: Principles and Applications
|
|
2022 |
|
|
[5]
|
DATA SECURITY—THE NEXT IMPERATIVE IN HEALTHCARE SYSTEMS
|
|
Biomedical Engineering: Applications, Basis …,
2022 |
|
|
[6]
|
Secure Routing Protocol for Wireless Sensor Networks: Survey
|
|
2022 8th International …,
2022 |
|
|
[7]
|
Securitatea rețelelor IoT
|
|
2022 |
|
|
[8]
|
WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS UNDER SINKHOLE ATTACKS.
|
|
Isawi… - International Journal of …,
2021 |
|
|
[9]
|
State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions
|
|
Sustainability,
2021 |
|
|
[10]
|
A robust fixed path-based routing scheme for protecting the source location privacy in WSNs
|
|
2021 17th International …,
2021 |
|
|
[11]
|
Detection and classifying security attacks in wireless sensor networks
|
|
2021 |
|
|
[12]
|
Comparison of Various Attacks on WSN Layers—Based on the Site of the Attacker and Access Level
|
|
2021 |
|
|
[13]
|
Internet of Things 2.0: Concepts, Applications, and Future Directions
|
|
2021 |
|
|
[14]
|
Cloud Network Management: An IoT Based Framework
|
|
2020 |
|
|
[15]
|
Defense Against Integrity and Privacy Attacks in The Internet of Things
|
|
2020 |
|
|
[16]
|
A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)
|
|
2020 |
|
|
[17]
|
NB-IoT Security: A Survey
|
|
2020 |
|
|
[18]
|
Khảo sát các vấn đề bảo mật trong mạng cảm biến không dây
|
|
2020 |
|
|
[19]
|
Методы и алгоритмы оценки защищенности встроенного программного обеспечения на основе нечеткой логики
|
|
2020 |
|
|
[20]
|
Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems
|
|
2020 |
|
|
[21]
|
An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks
|
|
2019 |
|
|
[22]
|
A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas
|
|
2019 |
|
|
[23]
|
Privacy-aware query processing in vehicular ad-hoc networks
|
|
2019 |
|
|
[24]
|
A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare
|
|
2019 |
|
|
[25]
|
Sinkhole Attack Detection in A Wireless Sensor Networks using Enhanced Ant Colony Optimization to Improve Detection Rate
|
|
2019 |
|
|
[26]
|
A Modified Leach Routing Algorithm for Increasing Lifetime of the Wireless Sensor Network
|
|
2018 |
|
|
[27]
|
Anatomy of Threats to the Internet of Things
|
|
2018 |
|
|
[28]
|
Sensor Networks Attacks Classifications and Mitigation
|
|
2018 |
|
|
[29]
|
Classification of Attacks on Wireless Sensor Networks: A Survey
|
|
2018 |
|
|
[30]
|
Active defense strategy against jamming attack in wireless sensor networks
|
|
2018 |
|
|
[31]
|
Об одном подходе к формированию перечня мер по защите информации в беспроводных сенсорных сетях газодобывающего предприятия
|
|
2018 |
|
|
[32]
|
A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach
|
|
International Journal of Information System Modeling and Design (IJISMD),
2018 |
|
|
[33]
|
Wireless Sensor Network Security for Cyber-Physical Systems
|
|
Cyber Security for Cyber Physical Systems,
2018 |
|
|
[34]
|
WSN Security Mechanisms for CPS
|
|
Cyber Security for Cyber Physical Systems,
2018 |
|
|
[35]
|
Implementation of Multiple layer security of Cloud server
|
|
2018 |
|
|
[36]
|
Proposing a Behavior-Based IDS Model for IoT Environment
|
|
Information Systems: Research, Development, Applications, Education,
2018 |
|
|
[37]
|
A review on security and privacy issues in wireless sensor networks
|
|
2017 |
|
|
[38]
|
AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN)
|
|
2017 |
|
|
[39]
|
Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control
|
|
Electronics,
2017 |
|
|
[40]
|
Recognizing Attacks in Wireless Sensor Network in View of Internet of Things
|
|
Internet of Things: Novel Advances and Envisioned Applications,
2017 |
|
|
[41]
|
A Survey of Wireless Sensor Network Attacks
|
|
Communications on Applied Electronics,
2017 |
|
|
[42]
|
High-level design of Wireless sensor networks for performance optimization under security hazards
|
|
ACM Transactions on Sensor Networks (TOSN),
2017 |
|
|
[43]
|
Customized Hardware Crypto Engine for Wireless Sensor Networks
|
|
2017 |
|
|
[44]
|
Security Issues in Wireless Sensor Networks
|
|
Journal of Multidisciplinary Engineering Science Studies (JMESS),
2017 |
|
|
[45]
|
A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks
|
|
International Journal of Computer Applications,
2017 |
|
|
[46]
|
Sistemas embebidos en red seguros
|
|
2017 |
|
|
[47]
|
Malware propagation in Wireless Sensor Networks: global models vs Individual-based models
|
|
2017 |
|
|
[48]
|
Secure data collection in wireless sensor networks.
|
|
2017 |
|
|
[49]
|
A REVIEW OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
|
|
2017 |
|
|
[50]
|
PROTECTION ISSUES IN WORMHOLE ATTACK
|
|
International Journal of Scientific Development and Research,
2017 |
|
|
[51]
|
La primera edición expurgada de una letrilla de Juan Meléndez Valdés
|
|
La primera edición expurgada de una letrilla de Juan …,
2017 |
|
|
[52]
|
Keamanan Jaringan Sensor Nirkabel: Serangan dan Solusinya
|
|
2016 |
|
|
[53]
|
Keamanan dalam Jaringan Sensor Nirkabel: Serangan dan Solusi
|
|
2016 |
|
|
[54]
|
Security Attacks and Defense Mechanisms in Wireless Sensor Network: A Survey
|
|
2016 |
|
|
[55]
|
Review on Security Issues in Wireless Sensor Networks
|
|
2016 |
|
|
[56]
|
Impact van publieke sleutel cryptografie op draadloze sensornetwerken
|
|
2016 |
|
|
[57]
|
Security in Wireless Sensor Networks: Attacks and Solutions
|
|
environment,
2016 |
|
|
[58]
|
Light Weight Authentication framework for WSN
|
|
International Conference on El ectrical, Electronics, and Optimization Techni ques (ICEEOT) ,
2016 |
|
|
[59]
|
Simulation of Attacks for Security in Wireless Sensor Network
|
|
Sensors,
2016 |
|
|
[60]
|
Security issues in wireless networks: An overview
|
|
2016 |
|
|
[61]
|
A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks
|
|
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16,
2016 |
|
|
[62]
|
A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks
|
|
2016 |
|
|
[63]
|
A Review: DoS and DDoS Attacks
|
|
2015 |
|
|
[64]
|
Secure Data Collection Using Randomized Multipath Routing
|
|
International Journal on Recent and Innovation Trends in Computing and Communication,
2015 |
|
|
[65]
|
Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs
|
|
International Journal of Distributed Sensor Networks,
2015 |
|
|
[66]
|
Wireless Sensor Networks: Virtual Platform for Performance Analysis and Attack Simulation
|
|
Trusted Computing for Embedded Systems,
2015 |
|
|
[67]
|
Efficient Power Utilization with Reactive Routing Protocols in Mobile Ad-Hoc Networks under the influence of Application layer Attack
|
|
International Journal of Software & Hardware Research in Engineering,
2015 |
|
|
[68]
|
a Security ScheMe for video StreaMing in wireleSS MultiMedia SenSor networkS
|
|
2015 |
|
|
[69]
|
A survey of security attacks, defenses and security mechanisms in wireless sensor network
|
|
2015 |
|
|
[70]
|
Security Attacks, challenges and Mechanisms for security in Wireless Sensor Network: A survey
|
|
2015 |
|
|
[71]
|
Comparative Analysis of WSN MAC Protocols and Node Clone Attack
|
|
2015 |
|
|
[72]
|
ASecurity SCHEME FOR VIDEO STREAMING IN WIRELESS MULTIMEDIA SENSOR NETWORKS
|
|
2015 |
|
|
[73]
|
Attacks in wireless sensor networks
|
|
2014 |
|
|
[74]
|
An efficient and optimal clustering algorithm for real-time forest fire prediction with
|
|
Communications and Signal Processing (ICCSP), 2014 International Conference on,
2014 |
|
|
[75]
|
A Novel Clustering Algorithm for Homogenous and Large-Scale Wireless Sensor Networks: Based on Sensor Nodes Deployment Location Coordinates
|
|
IJCSNS,
2014 |
|
|
[76]
|
Attacks And Counterattacks On Wireless Sensor Networks
|
|
arXiv preprint arXiv:1401.4443,
2014 |
|
|
[77]
|
A Comprehensive Comparison of Attacks in Wireless Sensor Networks
|
|
2014 |
|
|
[78]
|
Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
|
|
The Computer Journal,
2014 |
|
|
[79]
|
Detection of DOS attack and Sink hole In WSN
|
|
2014 |
|
|
[80]
|
Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes
|
|
IJ Information Technology and Computer Science,
2014 |
|
|
[81]
|
Routing Attacks in Wireless Sensor Networks: A Survey
|
|
2014 |
|
|
[82]
|
Randomised multipath routing for secure data collection
|
|
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on,
2014 |
|
|
[83]
|
SCHEDULING ALGORITHMS OF REAL TIME SYSTEM AN OVERVIEW
|
|
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS,
2014 |
|
|
[84]
|
Detection of Sinkhole attack in Wireless Sensor Networks using Mobile agent and multiple Base stations
|
|
2014 |
|
|
[85]
|
ANALYSIS OF AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST NODE MISBEHAVIOR ATTACKS IN WIRELESS SENSOR NETWORKS
|
|
2014 |
|
|
[86]
|
Plataforma virtual para el análisis del rendimiento y la seguridad en redes de sensores inalámbricos
|
|
2014 |
|
|
[87]
|
Détection d'attaques dans un système WBAN de surveillance médicale à distance
|
|
Thesis,
2014 |
|
|
[88]
|
An ECC-Based Secure Routing Protocol for Wireless Sensor Network
|
|
Sensors & Transducers,
2014 |
|
|
[89]
|
Agent-based intrusion detection and self-recovery system for wireless sensor networks
|
|
Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on,
2013 |
|
|
[90]
|
Plug–and–play mechanism for plain transducers with wired digital interfaces attached to wireless sensor network nodes
|
|
International Journal of Sensor Networks,
2013 |
|
|
[91]
|
Data link layer security protocols in wireless sensor networks: A survey
|
|
Networking, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on,
2013 |
|
|
[92]
|
Detection of Wormhole Attacks in Wireless Sensor Networks
|
|
Thesis,
2013 |
|
|
[93]
|
An Introduction to Various Basic Concepts of Clustering Techniques on Wireless Sensor Networks
|
|
International Journal of Computational Engineering Research (IJCER),
2013 |
|
|
[94]
|
Investigation of Application Attack on MANET
|
|
IJCA June,
2013 |
|
|
[95]
|
HCERHSW: A Hierarchical, Clustering-based and Energy-aware Routing Algorithm for Homogenous and Static Wireless Sensor Networks
|
|
2013 |
|
|
[96]
|
A Secure Energy Efficient Schema for Wireless Multimedia Sensor Networks
|
|
Wireless Communication,
2013 |
|
|
[97]
|
Review of main security threats in Smart Home networks
|
|
2012 |
|
|
[98]
|
Attacks and Countermeasures in Wireless Sensor Network
|
|
International Journal of Computer Science and Communication Engineering, IJCSCE Special issue on “Emerging Trends in Engineering” ICETIE,
2012 |
|
|
[99]
|
A Secure Energy Mechanism for WSN and Its Implementation in NS-2
|
|
Wireless Communication,
2012 |
|
|
[100]
|
WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
|
|
2012 |
|
|
[101]
|
Attacks and Countermeasures in Wireless Sensor Networks
|
|
2012 |
|
|
[102]
|
A High-Level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
|
|
Wireless Sensor Network,
2011 |
|
|
[103]
|
A hierarchical intrusion detection architecture for wireless sensor networks
|
|
International Journal of Network Security and its Applications (IJNSA),
2011 |
|
|
[104]
|
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
|
|
Int'l J. of Communications, Network and System Sciences,
2011 |
|
|