The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for sinkhole with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2009 (19) 2010-2014 (16) 2015-2017 (15) 2018-2020 (22) 2021-2023 (24) 2024 (4)
Publication types (Num. hits)
article(64) inproceedings(35) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 22 occurrences of 19 keywords

Results
Found 100 publication records. Showing 100 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
103Benjamin Jack Culpepper, H. Chris Tseng Sinkhole Intrusion Indicators in DSR MANETs. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sinkhole, MANET, fuzzy logic, intrusion detection, DSR
67Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, Marios Mpasoukos Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. Search on Bibsonomy ALGOSENSORS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Anurag Kulshrestha, Ling Chang, Alfred Stein Sinkhole Scanner: A New Method to Detect Sinkhole-Related Spatio-Temporal Patterns in InSAR Deformation Time Series. Search on Bibsonomy Remote. Sens. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Majid Meghdadi Kablosuz algılayıcı ağlarda sinkhole atağı için geliştirilmiş bir güvenlik algoritması (Design and implementation of an algorithm against sinkhole atack in wireless sensor networks) Search on Bibsonomy 2010   RDF
24Ankita Kumari, Sandip Dutta, Soubhik Chakraborty A fuzzy based Q - learning approach to prevent sinkhole attacks in MANET (FQ - SPM). Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Guodong Zhu, Yunyun Niu, Long Ruan, Xiaohao Zhang AMFENet: An Adaptive Multiscale Feature Fusion Enhancement Network for Sinkhole Detection. Search on Bibsonomy IEEE Geosci. Remote. Sens. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Ahmed M. Khedr, P. V. Pravija Raj, S. Sheeja Rani Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Dhanagopal Ramachandran, J. Venkatesh, R. Jothilakshmi, G. Gugapriya Sinkhole detection and prediction using watermarking (SNDW). Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Aya Abdul Rahman Al-chikh Omar, Bassel Soudan, Ala Altaweel A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24P. Shanmugaraja, Manish Bhardwaj, Abolfazl Mehbodniya, Y. Sharmasth Vali, Pundru Chandra Shaker Reddy An Efficient Clustered M-path Sinkhole Attack Detection (MSAD) Algorithm for Wireless Sensor Networks. Search on Bibsonomy Ad Hoc Sens. Wirel. Networks The full citation details ... 2023 DBLP  BibTeX  RDF
24Md. Shafiqul Islam, Muntaha Tasnim, Upama Kabir, Mosarrat Jahan Securing smart home against sinkhole attack using weight-based IDS placement strategy. Search on Bibsonomy IET Wirel. Sens. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, Mohammad Adnan Aladaileh, Shaza Dawood Ahmed Rihan Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Julian L. Webber, Ahmed Arafa, Abolfazl Mehbodniya, Sathishkumar Karupusamy, Bhoomi Shah, Anil Kumar Dahiya 0001, Pratik Kanani An efficient intrusion detection framework for mitigating blackhole and sinkhole attacks in healthcare wireless sensor networks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24David Orbea, Christyan Cruz Ulloa, Jaime del Cerro, Antonio Barrientos RUDE-AL: Roped UGV Deployment Algorithm of an MCDPR for Sinkhole Exploration. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Zhijun Teng, Mingzhe Li, Libo Yu, Jinliang Gu, Meng Li Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Alekha Kumar Mishra, Deepak Puthal, Asis Kumar Tripathy A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Wojciech T. Witkowski, Artur Guzy, Magdalena Lucka, Krzysztof Kusztykiewicz Study on Sinkhole Formation Mechanism in Abandoned Mines. Search on Bibsonomy IGARSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Helene Petschko, Markus Zehner, Patrick Fischer, Jason Goetz Terrestrial and Airborne Structure from Motion Photogrammetry Applied for Change Detection within a Sinkhole in Thuringia, Germany. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Amerigo Corradetti, Thomas Seers, Marco Mercuri, Chiara Calligaris, Alice Busetti, Luca Zini Benchmarking Different SfM-MVS Photogrammetric and iOS LiDAR Acquisition Methods for the Digital Preservation of a Short-Lived Excavation: A Case Study from an Area of Sinkhole Related Subsidence. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Arun Kumar Sangaiah, Amir Javadpour, Forough Ja'fari, Pedro Pinto 0001, Hamidreza Ahmadi 0001, Weizhe Zhang CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Anurag Kulshrestha, Ling Chang, Alfred Stein Use of LSTM for Sinkhole-Related Anomaly Detection and Classification of InSAR Deformation Time Series. Search on Bibsonomy IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Bilal Ahmad, Syed Muhammad Noman Hasany, Abdul Hameed Pitafi Effective modelling of sinkhole detection algorithm for edge-based Internet of Things (IoT) sensing devices. Search on Bibsonomy IET Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Koushik Mondal, Satyendra Singh Yadav, Vipin Pal, Akhilendra Pratap Singh, Yogita, Mangal Singh Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station. Search on Bibsonomy Int. J. Inf. Syst. Model. Des. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Yushintia Pramitarini, Ridho Hendra Yoga Perdana, Thong Nhat Tran, Kyusung Shim, Beongku An A Hybrid Price Auction-Based Secure Routing Protocol Using Advanced Speed and Cosine Similarity-Based Clustering against Sinkhole Attack in VANETs. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Hakan Ahmet Nefeslioglu, Beste Tavus, Melahat Er, Gamze Ertugrul, Aybuke Ozdemir, Alperen Kaya, Sultan Kocaman Integration of an InSAR and ANN for Sinkhole Susceptibility Mapping: A Case Study from Kirikkale-Delice (Turkey). Search on Bibsonomy ISPRS Int. J. Geo Inf. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Mahdi Khoshlahjeh Azar, Amir Hamedpour, Yasser Maghsoudi, Daniele Perissin Analysis of the Deformation Behavior and Sinkhole Risk in Kerdabad, Iran Using the PS-InSAR Method. Search on Bibsonomy Remote. Sens. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Prathapchandran Kannimuthu, Janani Thangamuthu A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest - RFTRUST. Search on Bibsonomy Comput. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Sihem Aissaoui, Sofiane Boukli Hacene Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks. Search on Bibsonomy Int. J. Wirel. Networks Broadband Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Osman Orhan, Talib Oliver-Cabrera, Shimon Wdowinski, Sefa Yalvaç, Murat Yakar Land Subsidence and Its Relations with Sinkhole Activity in Karapınar Region, Turkey: A Multi-Sensor InSAR Time Series Study. Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Sanjana Palisetti, B. R. Chandavarkar, Akhilraj V. Gadagkar Intrusion Detection of Sinkhole Attack in Underwater Acoustic Sensor Networks. Search on Bibsonomy ICCCNT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Alekha Kumar Mishra, Maitreyee Sinha, Asis Kumar Tripathy A sinkhole prevention mechanism for RPL in IoT. Search on Bibsonomy Int. J. Comput. Sci. Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Huda A. Babaeer, Saad A. Al-Ahmadi Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Lanka Chris Sejaphala, Mthulisi Velempini The Design of a Defense Mechanism to Mitigate Sinkhole Attack in Software Defined Wireless Sensor Cognitive Radio Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Mina Zaminkar, Reza Fotohi SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Mina Zaminkar, Reza Fotohi SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park 0005 Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Fakhr-eddine Hachemi, Mohammed Mana, Boucif Amar Bensaber Study of the Impact of Sinkhole Attack in IoT Using Shewhart Control Charts. Search on Bibsonomy GLOBECOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Pradeepkumar Bhale, Sukanta Dey, Santosh Biswas, Sukumar Nandi Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. Search on Bibsonomy I4CS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Christiana Ioannou, Vasos Vassiliou Accurate Detection of Sinkhole Attacks in IoT Networks Using Local Agents. Search on Bibsonomy MedComNet The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Yong Je Kim, Boo Hyun Nam, Heejung Youn Sinkhole Detection and Characterization Using LiDAR-Derived DEM with Logistic Regression. Search on Bibsonomy Remote. Sens. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Ran N. Nof, Meir Abelson, Eli Raz, Yochay Magen, Simone Atzori, Stefano Salvi, Gidon Baer SAR Interferometry for Sinkhole Early Warning and Susceptibility Assessment along the Dead Sea, Israel. Search on Bibsonomy Remote. Sens. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Sayed Mohammad Hossein Mirshahjafari, Behrouz Shahgholi Ghahfarokhi Sinkhole+CloneID: A hybrid attack on RPL performance and detection method. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Adnan Nadeem, Turki G. Alghamdi Detection Algorithm for Sinkhole Attack in Body Area Sensor Networks Using Local Information. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2019 DBLP  BibTeX  RDF
24Aqeel-ur Rehman, Sadiq ur Rehman, Haris Raheem Sinkhole Attacks in Wireless Sensor Networks: A Survey. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Sabeen Tahir, Sheikh Tahir Bakhsh, Rayan A. Alsemmeari An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Charbel Abou Chakra, Simon Gascoin, Janine Somma, Pascal Fanise, Laurent Drapeau Monitoring the Snowpack Volume in a Sinkhole on Mount Lebanon using Time Lapse Photogrammetry. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Péter Enyedi, Melinda Pap, Zoltán Kovács, László Takács-Szilágyi, Szilárd Szabó Efficiency of local minima and GLM techniques in sinkhole extraction from a LiDAR-based terrain model. Search on Bibsonomy Int. J. Digit. Earth The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Zhaohui Zhang, Sanyang Liu, Yi-Guang Bai, Yalin Zheng M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Nam Vu Hoai, Nguyen Manh Dung, Soonghwan Ro Sinkhole Detection by Deep Learning and Data Association. Search on Bibsonomy ICUFN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Andre Theron, Jeanine Engelbrecht The Role of Earth Observation, with a Focus on SAR Interferometry, for Sinkhole Hazard Assessment. Search on Bibsonomy Remote. Sens. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Li Zhang, Xiaohang Wang 0001, Yingtao Jiang, Mei Yang, Terrence S. T. Mak, Amit Kumar Singh 0002 Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Syed Rizvi 0001, Joseph Gualdoni, Abdul Razaque Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Andre Theron, Jeanine Engelbrecht, Jaco Kemp, Waldo Kleynhans, Terrence Turnbull Detection of Sinkhole Precursors Through SAR Interferometry: Radar and Geological Considerations. Search on Bibsonomy IEEE Geosci. Remote. Sens. Lett. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Ghazaleh Jahandoust, Fatemeh Ghassemi An adaptive sinkhole aware algorithm in wireless sensor networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Hyun Mi Jung, Haeng-Gon Lee, Jang Won Choi 0001 Efficient Malicious Packet Capture Through Advanced DNS Sinkhole. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Martin Ussath, Feng Cheng 0002, Christoph Meinel Enhanced Sinkhole System: Collecting System Details to Support Investigations. Search on Bibsonomy MSPN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24M. T. Kurniawan, Setiadi Yazid Mitigation strategy of sinkhole attack in Wireless Sensor Network. Search on Bibsonomy IWBIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Immanuel John Raja Jebadurai, Elijah Blessing Rajsingh, Getzi Jeba Leelipushpam Paulraj, Salaja Silas EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Muhammad Khurram Khan Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Andre Theron, Jeanine Engelbrecht, Jaco Kemp, Waldo Kleynhans, Terrence Turnbull Detection of sinkhole precursors through SAR interferometry: First results from South Africa. Search on Bibsonomy IGARSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Ranjeeth Kumar Sundararajan, Umamakeswari Arumugam Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks. Search on Bibsonomy J. Sensors The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Khurram Gulzar Rana, Yongquan Cai, Allah Ditta, Muhammad Azeem 0001, Muhammad Qasim Circumventing sinkhole attack in ad hoc networks. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24George W. Kibirige, Camilius A. Sanga A Survey on Detection of Sinkhole Attack in Wireless Sensor Network. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
24Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Nils Aschenbruck Identification of contamination zones for sinkhole detection in MANETs. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Guangjie Han, Xun Li, Jinfang Jiang, Lei Shu 0001, Jaime Lloret 0001 Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. Search on Bibsonomy Comput. J. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Christian Cervantes, Diego Poplade, Michele Nogueira, Aldri Santos Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. Search on Bibsonomy IM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Clark Taylor, Thienne M. Johnson Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks. Search on Bibsonomy WCNC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, Payam Mousavi Detection and mitigation of sinkhole attacks in wireless sensor networks. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24N. K. Sreelaja, G. A. Vijayalakshmi Pai Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Eun-Hee Jeong, Byung kwan Lee An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Leovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro García-Teodoro, Nils Aschenbruck A Novel Collaborative Approach for Sinkhole Detection in MANETs. Search on Bibsonomy ADHOC-NOW Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Fangjiao Zhang, Lidong Zhai, Jincui Yang, Xiang Cui Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks. Search on Bibsonomy ITQM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24D. Udaya Suriya Rajkumar, Rajamani Vayanaperumal A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Sina Hamedheidari, Reza Rafeh A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24HeeSeok Kim, Sang-Soo Choi, Jungsuk Song 0001 A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails. Search on Bibsonomy ICONIP (1) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Fabrice Le Fessant, Antonis Papadimitriou, Aline Carneiro Viana, Cigdem Sengul, Esther Palomar A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis. Search on Bibsonomy Comput. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Kevin Weekly, Kristofer S. J. Pister Evaluating sinkhole defense techniques in RPL networks. Search on Bibsonomy ICNP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Nisarg Gandhewar, Rahila Patel Review on Sinkhole Detection Techniques in Mobile Adhoc Network. Search on Bibsonomy SocProS (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Woochul Shim, Gisung Kim, Sehun Kim A distributed sinkhole detection method using cluster analysis. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Stefan K. Stafrace, Nick Antonopoulos Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks. Search on Bibsonomy Comput. Commun. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Changlong Chen, Min Song 0002, George Hsieh Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. Search on Bibsonomy WCNIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Haeng-Gon Lee, Sang-Soo Choi, Younsu Lee, Hark-Soo Park Enhanced Sinkhole System by Improving Post-processing Mechanism. Search on Bibsonomy FGIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Yenumula B. Reddy Detecting Sinkhole Attacks by Observing the Quality of Link in Wireless Sensor Networks. Search on Bibsonomy ICWN The full citation details ... 2009 DBLP  BibTeX  RDF
24Byung Goo Choi, Eung Jun Cho, Jin Ho Kim, Choong Seon Hong, Jin Hyoung Kim A sinkhole attack detection mechanism for LQI based mesh routing in WSN. Search on Bibsonomy ICOIN The full citation details ... 2009 DBLP  BibTeX  RDF
24Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. Search on Bibsonomy WiMob The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Edith C. H. Ngai, Jiangchuan Liu, Michael R. Lyu An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Search on Bibsonomy Comput. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Edith C. H. Ngai, Jiangchuan Liu, Michael R. Lyu On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24H. Chris Tseng, Benjamin Jack Culpepper Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Huzaifa Al Nahas, Jitender S. Deogun, Eric D. Manley Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sensor networks, Energy-efficiency, Secure routing, Wormhole attacks
22Abhinav Pathak, Feng Qian 0001, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan Botnet spam campaigns can be long lasting: evidence, implications, and analysis. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributedness, open relay, spam campaign, botnet, burstiness
22Abhinav Pathak, Syed Ali Raza Jafri, Y. Charlie Hu The Case for Spam-Aware High Performance Mail Server Architecture. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh Identity-based secure protocol scheme for wireless sensor network. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ID-based authentication, clustering, wireless sensor network, authentication, proxy
22Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu Authenticated Directed Diffusion. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Directed Diffusion
22Olivier Powell, Jean-Marc Seigneur, Luminita Moraru Trustworthily Forwarding Sensor Networks Information to the Internet. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang Location-based compromise-tolerant security mechanisms for wireless sensor networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Anirudh Ramachandran, Nick Feamster Understanding the network-level behavior of spammers. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, network management, spam, BGP, botnet
22Xiaojiang Du, Fengiing Lin Secure cell relay routing protocol for sensor networks. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 100 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license