Author:
Sajjad Syed Muhammad,Bouk Safdar Hussain,Yousaf Muhammad
Reference27 articles.
1. C. Chong and S. Kumar “Sensor networks: Evolution, opportunities, and challenges”, Proc. IEEE, vol. 91, no. 8, pp.1247-1256 2003.
2. C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Ad Hoc Networks, vol. 1, pp.293-315 2003.
3. Martins, D.; Guyennet, H., “Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey,” Network-Based Information Systems (NBiS), 2010 13th International Conference on, vol., no., pp.313,320, 14-16 Sept. 2010.
4. K Xing, S Srinivasan, M Rivera, J Li, X Cheng, ed. by SCH Huang, D MacCallum, and D-Z Du, Attacks and countermeasures in sensor networks: A survey, in Network Security, pp. 251-272, Springer, New York, 2010.
5. I. Krontiris, T. Dimitriou, and F. C. Freling, “Towards intrusion detection in wireless sensor networks,” in EW 2007: Proceeding of the 13th Eurpoean Wireless ConferenceL Enabling Technologies for Wireless Multimedia Communications, April 2007.
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献