Detecting selective forwarding attacks in wireless sensor networks, IPDPS 2006: 20th International Parallel and Distributed Processing Symposium, pp.8-15, 2006. ,
« Minimizing False Alarms on Intrusion Detection for Wireless Sensor. », Cam, Hasan; Military Communications Conference, pp.29-31, 2007. ,
« A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks, Proceedings of the ICUIMC-09, pp.238-245, 2009. ,
« Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05, pp.16-23, 2005. ,
« Computer crime: a crime fighter's handbook », 1995. ,
« An ontology for the management of heteregenous alerts of information system, The 2007 International Conference on Security and Management (SAM'07), 2007. ,
Information system attacks: A preliminary classification scheme, Computers and Security, pp.29-46, 1997. ,
DOI : 10.1016/S0167-4048(97)85785-9
« Reputation-based Framework for High Integrity Sensor Networks, ACM Security for Ad-hoc and Sensor Networks, 2004. ,
A decentralized intrusion detection system for increasing security of wireless sensor networks, 2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007), pp.1408-1411, 2007. ,
DOI : 10.1109/EFTA.2007.4416949
« Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks, Proceedings of the IEEE of the 36th Hawaii International Conference on System Sciences, 2002. ,
«Applying the Mobile Agent Paradigm to Distributed Intrusion Detection in Wireless Sensor networks, 40th Southeastern Symposium on System Theory, pp.16-18, 2008. ,
Détection d'intrusions comportementale par diversification de COTS : application au cas des serveurs web, Thèse de doctorat Matisse SSIR, 2008. ,
« Building Intrusion Detection with a Wireless Sensor Network, First International Conference on Ad Hoc Networks , Niagara Falls, pp.607-622, 2009. ,
« Cooperative tracking with binary-detection sensor networks. » in proceedings of, 2003. ,
Computer related risks [ONA 05] ONAT I , A MIRI. « An intrusion detection system for wireless sensor networks, Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.253-259, 1995. ,
« A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks, Proceedings of the ICUIMC-09, pp.238-245, 2009. ,
« A full approach for intrusion detection in wireless sensor networks, School of Information and Communication Technology, KTH, 2007. ,
« A novel overlay IDS for wireless sensor networks, IADIS International Conference Wireless Applications and Computing, pp.144-148, 2008. ,
« Intrusion detection techniques in mobile ad hoc and wireless sensor networks, IEEE Wireless Communications, pp.45-63, 2007. ,
How to systematically classify computer security intrusions, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), p.154, 1997. ,
DOI : 10.1109/SECPRI.1997.601330