Centralized IDS based on misuse detection for cluster-based wireless sensors networks
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - infona.pl
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
F Hidoussi, H Toral-Cruz, DE Boubiche… - … An International Journal, 2015 - dl.acm.org
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks.
F Hidoussi, H Toral-Cruz, D Boubiche… - Wireless Personal …, 2015 - search.ebscohost.com
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
[PDF][PDF] Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
F Hidoussi, H Toral-Cruz, DE Boubiche, K Lakhtaria… - academia.edu
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - vbn.aau.dk
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
[引用][C] Centralized IDS based on misuse detection for cluster-based wireless sensors networks
F Hidoussi, H Toral-Cruz, DE Boubiche, K Lakhtaria… - 2015 - dspace.vsb.cz
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
[引用][C] Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - cir.nii.ac.jp
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks |
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …
Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
F Hidoussi, H Toral-Cruz, DE Boubiche… - Wireless Personal …, 2015 - pure.au.dk
Despite of their energy efficiency, most of WSN's cluster-based routing protocols are
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …
vulnerable to security threats. Selective forwarding and black hole attacks are ranked among …