Author:
Alqahtani Abdulrahman Saad,Abuhasel Khaled Ali,Alquraish Mohammed
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference27 articles.
1. Amin SO, Siddiqui MS, Hong MS, Lee S (2009) RIDES: robust intrusion detection system for ip-based ubiquitous sensor networks. Sensors 9(5):3447–3468
2. Bao F, Chen R, Chang M, Cho J (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183
3. Branicky, M. Cavusoglu, and V. Liberatore (2006) Multi-disciplinary challenges and directions in networked cyber-physical systems. In: Proc NSF Workshop Cyber-Phys Syst, Austin, TX, USA
4. Bigham D. Gamez, Lu N (2003) Safeguarding SCADA systems with anomaly detection. Computer network security, vol 2776. Springer, Berlin, pp 171–182
5. Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献