Centralized IDS based on misuse detection for cluster-based wireless sensors networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - Springer
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - infona.pl
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - … An International Journal, 2015 - dl.acm.org
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks.

F Hidoussi, H Toral-Cruz, D Boubiche… - Wireless Personal …, 2015 - search.ebscohost.com
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

[PDF][PDF] Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche, K Lakhtaria… - academia.edu
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - vbn.aau.dk
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

[引用][C] Centralized IDS based on misuse detection for cluster-based wireless sensors networks

F Hidoussi, H Toral-Cruz, DE Boubiche, K Lakhtaria… - 2015 - dspace.vsb.cz
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

[引用][C] Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - cir.nii.ac.jp
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks |
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - pure.au.dk
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …

[引用][C] Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks

F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless personal …, 2015 - Springer