Author:
Sirajuddin Mohammad,Sateesh Kumar B.
Publisher
Springer Nature Singapore
Reference19 articles.
1. Butun I, Morgera S, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutorials 16(1):266–282. https://doi.org/10.1109/surv.2013.050113.00191
2. Tervoort T, De Oliveira M, Pieters W, Van Gelder P, Olabarriaga S, Marquering H (2020) Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: a scoping review. IEEE Access 8:84352–84361
3. Stallings W (1998) Cryptography and network security: principles and practice, 2nd edn. Prentice-Hall
4. Dahill B, Sanzgiri K, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In: Proceedings of the IEEE ICNP
5. Liao HJ, Richard LC, Lin Y, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16–24
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Mitigation of Black Hole and Selective Forwarding Attacks through Active Trust Mechanisms in Wireless Sensor Networks;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2023-05-10