B. Yu and B. Xiao, Detecting selective forwarding attacks in wireless sensor networks, IPDPS 2006: 20th International Parallel and Distributed Processing Symposium, pp.8-15, 2006.

Ç. Bhavik-parekh and . Hasan, « Minimizing False Alarms on Intrusion Detection for Wireless Sensor. », Cam, Hasan; Military Communications Conference, pp.29-31, 2007.

C. , H. Ch, and . Huang-y, « A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks, Proceedings of the ICUIMC-09, pp.238-245, 2009.

. Das, S. A. Da, P. Martins, M. Rocha-b, . Loureiro-a et al., « Decentralized intrusion detection in wireless sensor networks, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05, pp.16-23, 2005.

D. Icove, S. Karl, R. Vonstorch, and . William, « Computer crime: a crime fighter's handbook », 1995.

F. Benali, L. Véronique, and S. Ubéda, « An ontology for the management of heteregenous alerts of information system, The 2007 International Conference on Security and Management (SAM'07), 2007.

F. B. Cohen, Information system attacks: A preliminary classification scheme, Computers and Security, pp.29-46, 1997.
DOI : 10.1016/S0167-4048(97)85785-9

G. S. and M. B. Srivastava, « Reputation-based Framework for High Integrity Sensor Networks, ACM Security for Ad-hoc and Sensor Networks, 2004.

I. Chatzigiannakis and S. Andreas, A decentralized intrusion detection system for increasing security of wireless sensor networks, 2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007), pp.1408-1411, 2007.
DOI : 10.1109/EFTA.2007.4416949

R. Oleg and . Guha, « Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks, Proceedings of the IEEE of the 36th Hawaii International Conference on System Sciences, 2002.

K. Mohammed, «Applying the Mobile Agent Paradigm to Distributed Intrusion Detection in Wireless Sensor networks, 40th Southeastern Symposium on System Theory, pp.16-18, 2008.

M. «. Frédéric, Détection d'intrusions comportementale par diversification de COTS : application au cas des serveurs web, Thèse de doctorat Matisse SSIR, 2008.

M. Wälchli and B. Torsten, « Building Intrusion Detection with a Wireless Sensor Network, First International Conference on Ad Hoc Networks , Niagara Falls, pp.607-622, 2009.

M. K. Sundresh and . Y. Kwon, « Cooperative tracking with binary-detection sensor networks. » in proceedings of, 2003.

P. G. Neumann, Computer related risks [ONA 05] ONAT I , A MIRI. « An intrusion detection system for wireless sensor networks, Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.253-259, 1995.

. R. Chen-hsieh-ch and . Huang-y, « A New Method for Intrusion Detection on Hierarchical Wireless Sensor Networks, Proceedings of the ICUIMC-09, pp.238-245, 2009.

. A. Strikos, « A full approach for intrusion detection in wireless sensor networks, School of Information and Communication Technology, KTH, 2007.

S. Saha, S. Islam, and . Mohammad, « A novel overlay IDS for wireless sensor networks, IADIS International Conference Wireless Applications and Computing, pp.144-148, 2008.

S. Bo, O. Lawrence, X. Yang, and G. Sghaier, « Intrusion detection techniques in mobile ad hoc and wireless sensor networks, IEEE Wireless Communications, pp.45-63, 2007.

U. Lindqvist and J. Erland, How to systematically classify computer security intrusions, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), p.154, 1997.
DOI : 10.1109/SECPRI.1997.601330