References
- Agah , A. , Das , S. and Basu , K. 2004 . “ Intrusion detection in sensor networks: A non-copporative game approach ” . In IEEE NCA
- Bose , P. , Morin , P. , Stojmenovic , I. and Urrutia , J. 1999 . “ Routing with guaranteed delivery in ad hoc wireless networks ” . In DIALM
- Brose , G. , Vogel , A. and Duddy , K. 2002 . Java programming with CORBA , third , Wieey .
- Deng , J. , Han , R. and Mishra , S. 2004 . “ Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks ” . In IEEE DSN
- Di Pietro , R. , Etalle , S. , Havinga , P. , Law , Y. W. and Mancini , L. V. 2003 . “ LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks ” . In WiSPr
- Di Pietro , R. , Mancini , L. V. and Mei , A. 2004 . “ Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment ” . In WMAN
- Ding , M. , Chen , D. , Xing , K. and Cheng , X. 2005 . “ Localized faulttolerant event boundary detection in sensor networks ” . In INFOCOM
- Doumit , S. and Agrawal , D. 2003 . “ Self-organized critically and stochastic learning based intrusion detection system for wireless sensor networks ” . In MILCOM
- Du , W. , Fang , L. and Ning , P. 2005 . “ Lad: Localization anomaly detection for wireless sensor networks ” . In IPDPS
- Eckmann , S.-T. , Vigna , G. and Kemmer , R.-A. 2002 . Statl: An attack language for state-based intrusion detection . Journal of Computer Security , 10 : 71 – 104 .
- Fang , Q. , Gao , J. and Guibas , L. 2004 . “ Locating and bypassing, routing holes in sensor networks ” . In INFOCOM
- Heinzelman , W. , Chandrakasan , A. and Balakrishnan , H. 2000 . “ Energy-Efficient Communication Protocols for Wireless Microsensor Networks ” . In HICSS
- Hopcroft , J. E. and Ullman , J. D. 1979 . Introduction to automata theory, languages, and computation , Addison-Wesley .
- Inverardi , P. and Mostarda , L. 2005 . “ A distributed intrusion detection approach for secure software architecture ” . In EWSA
- Inverardi , P. , Mostarda , L. and Navarra , A. 2006 . “ Distributed idss for enhancing security in mobile wireless sensor networks ” . In PCAC
- Inverardi , P. , Mostarda , L. , Tivoli , M. and Autili , M. 2005 . “ Automatic synthesis of distributed adaptors for component-based system ” . In ASE
- Karlof , C. and Wagner , D. 2003 . “ Secure Routing in Sensor Networks: Attacks and Countermeasures ” . In SNPA
- Karp , B. and Kung , H. 2000 . “ Greedy perimeter stateless routing (GPSR) for wireless networks ” . In MobiCom
- Ko , C. , Ruschitza , M. and Levitt , K. 1997 . “ Execution monitoring of security-critical programs in distribute system: A specification-based approach ” . In IEEE
- Liao , W.-H. , Sheu , J.-P. and Tseng , Y.-C. 2001 . GRID: A fully location-aware routing protocol for mobile ad hoc networks . Telecommunication Systems , 18 ( 1–3 )
- Malpani , N. , Welch , J. and Vaidya , N. 2000 . Leader election algorithms for mobile ad hoc networks . DIALM ,
- Maniezzo , D. , Yao , K. and Mazzini , G. 2002 . “ Energetic trade-off between computing and communication resource in multimedia surveillance sensor network ” . In MWCN
- McCann , J. A. , Navarra , A. and Papadopoulos , A. A. 2005 . “ Connectionless Probabilistic (CoP) routing; an efficient protocol for Mobile Wireless Ad-Hoc Sensor Networks ” . In IPCCC
- Mittal , V. and Vigne , G. 2002 . “ Sensor-based intrusion detection for intra-domain distance-vector routing ” . In ACM CSS
- L. Mostarda. Distributed Intrusion Detection Systems for Secure Software Architectures. In Ph.D. dissertation http://www.di.univaq.it/mostarda/sito/default.php 2006
- Orset , J.-M. , Alcalde , B. and Cavalli , A. 2005 . “ An EFSM-based intrusion detection system for ad hoc networks ” . In ATVA
- Perrig , A. , Stankovic , J. and Wagner , D. 2004 . Security in wireless sensor networks . Commun. ACM , 47 ( 6 ) : 53 – 57 .
- Vora , A. and Nesterenko , M. 2004 . “ Secure Location Verification Using Radio Broadcast ” . In OPODIS
- Zhang , Y. , Lee , W. and Huang , Y.-A. 2003 . Intrusion detection techniques for mobile wireless networks . Wireliless Networks , : 545 – 556 .