Author:
Venkatraman S.,Arun Raj Kumar P.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference23 articles.
1. Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)
2. Mahmood, M.A., Seah, W.K.G., Welch, I.: Reliability in wireless sensor network: a survey and challenges ahead. Comp Netw. 1–55 (2014)
3. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium On Information Processing In Sensor Networks. April 26–27. (2004)
4. Raymond, D.R., Midkiff, S.F.: Denial of service in wireless sensor network: attacks and defenses. IEEE Pervasive Comput. 7(1), 74–81 (2008)
5. Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in adhoc networks. In: Proceeding Int’l Conf. Information Technology: Coding and Computing, vol. 2, pp. 657–662. (2005)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献