4.6 Article

A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Denial of Service Defence for Resource Availability in Wireless Sensor Networks

Opeyemi A. Osanaiye et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

Topology control in the presence of jammers for wireless sensor networks

Prasenjit Bhavathankar et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Engineering, Multidisciplinary

A hybrid intrusion detection system for virtual jamming attacks on wireless networks

Diego Santoro et al.

MEASUREMENT (2017)

Article Chemistry, Analytical

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks

Carolina Del-Valle-Soto et al.

SENSORS (2017)

Article Computer Science, Information Systems

Distributed Secure Estimation Over Wireless Sensor Networks Against Random Multichannel Jamming Attacks

Yanpeng Guan et al.

IEEE ACCESS (2017)

Review Engineering, Industrial

Jamming attacks on wireless networks: A taxonomic survey

Satish Vadlamani et al.

INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS (2016)

Review Computer Science, Hardware & Architecture

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

Opeyemi Osanaiye et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Automation & Control Systems

An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs)

E. Sasikala et al.

INTERNATIONAL JOURNAL OF FUZZY SYSTEMS (2015)

Article Telecommunications

Jamming Attacks Reliable Prevention in a Clustered Wireless Sensor Network

Claudio Valencia Cordero et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)

Article Engineering, Electrical & Electronic

Detection of Reactive Jamming in DSSS-based Wireless Communications

Michael Spuhler et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2014)

Article Engineering, Multidisciplinary

Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

Dan Tang et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2014)

Article Computer Science, Information Systems

CURD: Controllable reactive jamming detection in underwater sensor networks

Manas Khatua et al.

PERVASIVE AND MOBILE COMPUTING (2014)

Article Computer Science, Information Systems

How can sliding HyperLogLog and EWMA detect port scan attacks in IP traffic?

Yousra Chabchoub et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2014)

Article Engineering, Electrical & Electronic

Detection of jamming attacks in 802.11b wireless networks

Nadeem Sufyan et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2013)

Article Computer Science, Information Systems

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks

Abror Abduvaliyev et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Information Systems

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Computer Science, Hardware & Architecture

A Measurement-Driven Anti-Jamming System for 802.11 Networks

Konstantinos Pelechrinis et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2011)

Article Computer Science, Information Systems

Detection of Reactive Jamming in Sensor Networks

Mario Strasser et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2010)

Article Computer Science, Information Systems

Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks

Mingyan Li et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Automation & Control Systems

EWMA Algorithm in Network Practice

Petar Cisar et al.

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (2010)

Article Computer Science, Information Systems

An effective defensive node against jamming attacks in sensor networks

Aristides Mpitziopoulos et al.

SECURITY AND COMMUNICATION NETWORKS (2009)

Review Computer Science, Hardware & Architecture

Wireless sensor network survey

Jennifer Yick et al.

COMPUTER NETWORKS (2008)

Article Computer Science, Hardware & Architecture

Jamming sensor networks: Attack and defense strategies

Wenyuan Xu et al.

IEEE NETWORK (2006)

Article Computer Science, Hardware & Architecture

Computer intrusion detection through EWMA for autocorrelated and uncorrelated data

N Ye et al.

IEEE TRANSACTIONS ON RELIABILITY (2003)