[1]
|
Wood, A.D. and Stankovic, J.A. (2013) A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks. CRC Press, USA.
|
[2]
|
Eik, C., Mun, L., Ng, Y., Leckie, C. and Palaniswami, M. (2015) Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks, 17, No. 8.
|
[3]
|
Sankarasubramaniam, A.Y., Sung, W. and Cayiric, E. (2012) A Survey on Wireless Sensor Security. The Journal of Telecommunications Networking.
|
[4]
|
Gupptta, S. (2016) Similar Type Detection in Wireless Sensor Networks. MS Thesis, University of Houstan.
|
[5]
|
Schonderwoaerd, R., Bruten, J. and Holland, O. (2016) Ant-Like Agents for Load Balancing in Telecommunications Networks. CM Journal of Information Technology, 4, No. 8.
|
[6]
|
Zhigang, Xi Huei and Xeguang (2012) A Routing Protocol in Wireless Sensor Networks Based on Optimization Technique Ant Colony. International Conference on Information Application Technology, University of Canberra, Australia.
|
[7]
|
Tiranauch, A. (2015) A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Wireless/Mobile Networks Security, Chap. 7, Springer.
|
[8]
|
Aroora, N., Junaeja, D. and Bannsal, S. (2015) An Ant-Based Routing Algorithm for Detecting Attacks in Wireless Sensor Networks. JCIR.
|
[9]
|
Xiao, B. and Yu, B. (2016) Discovering Selective Progressing Attacks in Wireless Sensor Networks. IPDPS, Greece.
|
[10]
|
Chang, E., Gao, L., Han, S. and Dillon, T. (2013) Taxonomy of Attacks on Wireless Sensor Networks. Springer, London.
|
[11]
|
Qiaen, D., Chengh, H., Wulfe, W. and Cheng, L. (2016) Energy Balance Routing for Wireless Sensor Networks, Based on Swarm Intelligence. Second International Symposium on Intelligent Information Technology Application, USA.
|
[12]
|
Karlloef, C. and Wangner, D. (2013) Wireless Sensor Network Attacks Secure Routing and Countermeasures. Proceeding of the IEEE International Workshop on Sensor network Protocols and Applications, California.
|
[13]
|
Bahrgav, B. and Wang, W. (2016) Wormholes in Sensor Networks Visualization. ACM Press, New York, NY, USA.
|
[14]
|
Kar, A. and Kumar, K. (2013) Analysis of Wireless Sensor Network Security. Journal of Next-Generation Networks (JNGN), 5, No. 7.
|
[15]
|
Eberhart Richard, C., Kennedy, J. and Shi, Y. (2015) Swarm Intelligence. Moargan Kaauffmann Publishers, San Francisco.
|