The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004. ,
DOI : 10.1145/984622.984660
Linear Time Computation of Similarity for Sequential Data, J. Mach. Learn. Res, vol.9, pp.23-48, 2008. ,
Introduction to Side Channel Attacks, 2003. ,
Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps, Sensors, vol.9, issue.11, pp.9380-9397, 2009. ,
DOI : 10.1016/S0925-2312(97)00068-4
URL : http://www.mdpi.com/1424-8220/9/11/9380/pdf
Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps ,
Self-organizing maps for outlier detection, Neurocomputing, vol.18, issue.1-3, pp.33-60, 1998. ,
DOI : 10.1016/S0925-2312(97)00068-4