[1]
|
S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, “A Comparison of Routing Attacks on Wireless Sensor Networks,” Journal of Information Assurance and Security, Vol. 6, No. 1554-1010, 2011, pp. 195-215.
|
[2]
|
S. Mohammadi, R. A. Ebrahimi and H. Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks,” Journal of Information Security, Vol. 2, No. 2, 2011, pp. 69-84. doi:10.4236/jis.2011.22007
|
[3]
|
K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” International Journal of Computer Applications, Special Issue, 2010.
|
[4]
|
T. A. Zia, “A Security Framework for Wireless Sensor Networks,” PhD Thesis, The School of Information Technologies, University of Sydney, Sydney, 2008.
|
[5]
|
M. Saxena, “Security in Wireless Sensor Networks: A Layer-Based Classification,” Department of Computer Science, Purdue University, West Lafayette.
|
[6]
|
Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” Department of Electrical and Computer Engineering, University of Waterloo, Waterloo.
|
[7]
|
A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN,” Department of Computer Science, Faculty of Electrical Engineering and Information Technology, Republic of Macedonia, Skopje.
|
[8]
|
J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Elsevier’s Computer Networks Journal, Vol. 52, No. 12, 2008, pp. 2292-2330.
doi:10.1016/j.comnet.2008.04.002
|
[9]
|
C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Berkeley, 11 May 2003, pp. 113-127.
doi:10.1109/SNPA.2003.1203362
|
[10]
|
A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, Vol. 8, No. 5, 2003.
|
[11]
|
L. Krishnamachari, D. Estrin, and S. Wicker, “The Impact of Data Aggregation in Wireless Sensor Networks,” Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, 2002, pp. 575-578. doi:10.1109/ICDCSW.2002.1030829
|
[12]
|
V. Handziski, A. K?pke, H. Karl, C. Frank and W. Drytkiewicz, “Improving the Energy Efficiency of Directed Diffusion Using Passive Clustering,” Proceedings of the 1st European Workshop on Wireless Sensor Networks, Berlin, 2004, pp. 172-187.
|
[13]
|
K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems (IDPS),” National Institute of Standards and Technology, February 2007, pp. 800-894.
|
[14]
|
G. Maselli, L. Deri and S. Suin, “Design and Implementation of an Anomaly Detection System: An Empirical Approach,” University of Pisa, Pisa, 2002.
|
[15]
|
V. Chandala, A. Banerjee and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, University of Minnesota, Minnesota, September 2009.
|
[16]
|
Ch. Krügel and Th. Toth, “A Survey on Intrusion Detection Systemsm,” Vienna University of Technology, Vienna, 2000.
|
[17]
|
J. Molina, “Evaluating Attack Resiliency for Host Intrusion Detection Systems,” Doctoral Dissertation, University of Maryland, College Park.
|
[18]
|
S. Selliah, “Mobile Agent-Based Attack Resistant Architecture for Distributed Intrusion Detection System,” MSc. Thesis, College of Engineering and Mineral Resources, West Virginia University, Morgantown, 2001.
|
[19]
|
A. K. Jones and R. S. Sielken, “Computer System Intrusion Detection: A Survey,” University of Virginia, Charlottesville.
|
[20]
|
S. Northcutt and J. Novak, “Network Intrusion Detection: An Analyst’s Handbook,” New Riders Publishing, Thousand Oaks, 2002.
|
[21]
|
S. Zanero and S. M. Savaresi, “Unsupervised Learning Techniques for an Intrusion Detection System,” Proceedings of the 2004 ACM symposium on Applied computing, Nicosia, 14-17 March 2004, pp. 412-419.
|
[22]
|
O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, “An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks,” Expert Systems with Applications: An International Journal, Vol. 29, No. 4, 2005, pp. 713-722.
doi:10.1016/j.eswa.2005.05.002
|
[23]
|
R. A. Kemmerer and G. Vigna, “Intrusion Detection: A Brief History and Overview,” Computer Science Department, University of California, Santa Barbara, 2002.
|
[24]
|
S. Mohammadi and H. Jadidoleslamy, “A Comparison of Physical Attacks on Wireless Sensor Networks,” International Journal of Peer to Peer Networks, Vol. 2, No. 2, 2011, pp. 24-42. doi:10.5121/ijp2p.2011.2203
|
[25]
|
S. Mohammadi and H. Jadidoleslamy, “A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks,” International Journal of Information Assurance and Security, Vol. 6, 2011, pp. 331-345.
|