期刊文献+

网络攻击源监测发布系统的设计与实现

下载PDF
导出
摘要 近年来随着社会的进步,计算机网络变得发达,人们之间的沟通变得方便了许多。而随之而来的就是网络安全的问题,其影响足以引发每个人的关注。该文将围绕网络安全问题对网络攻击源进行有针对性地信息搜集和监测。
作者 李源
出处 《科技资讯》 2016年第12期2-3,共2页 Science & Technology Information
  • 相关文献

参考文献3

二级参考文献30

  • 1郎为民,杨宗凯,吴世忠,谭运猛.无线传感器网络安全研究[J].计算机科学,2005,32(5):54-58. 被引量:27
  • 2Akyildiz I F,Weilian S,Sankarasubramaniam Y, et al. A Survey on Sensor Networks [J]. IEEE Communications, 2002, 40 (8): 102-114
  • 3Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [J]. Ad Hoe Networks, 2003,1(1) :293-315
  • 4Bhuse V, Gupta A, Al-Fuqaha A. Detection of Masquerade Attacks on Wireless Sensor Networks CC]//Proceedings of the IEEE International Conference of Communications (ICC '07). June 2007 :1142-1147
  • 5Krontiris I, Dimitriou T, Giannetsos T, et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks[C]//ALGOSENSORS 2007, LNCS 4837. 2008:150-161
  • 6Clark B N, Colboum C J, Johnson D S. Unit Disk Graphs[J]. Discrete Math. , 1990,86 : 165-177
  • 7BHUSE V,GUPTA A,AL-FUQAHA A.Detection of masquerade attacks on wireless sensor networks[C] // Proceedings of the IEEE International Conference of Communications.Washington,DC:IEEE,2007:1142 -1147.
  • 8KRONTIRIS I,DIMITRIOU T,GIANNETSOS T,et al.Intrusion detection of sinkhole attacks in wireless sensor networks[C] // Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks.Berlin:Springer-Verlag,2007:150-161.
  • 9SHAMIR A.Identity-based cryptosystem and signature scheme[C] // Proceedings of CRYPTO 84 on Advances in cryptology.Berlin:Springer-Verlag,1985:47-53.
  • 10SAKAI R,OHGISHI K,KASAHARA M.Cryptesystems based on paring[C] // Proceedings of Symposium on Cryptography and Information Security.Japan:[s.n.].2000:26-28.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部