80 6.2.1 INSENS -Intrusion-tolerant routing protocol for wireless SEnsor NetworkS 81 6.2.2 ITSRP -Intrusion Tolerant, Secure Routing Protocol, p.83 ,
Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey, International Journal on AdHoc Networking Systems (IJANS), pp.1-20 ,
DOI : 10.5121/ijans.2014.4201
A study of Intrusion-tolerant routing in Wireless Sensor Networks, Proceedings of the Institute for System Programming of RAS, pp.99-110, 2014. ,
A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks, 10th International Conference on Broadband and Wireless Computing, Communication and Applications, pp.6-12, 2015. ,
Network monitoring using mmt: An application based on the user-agent field in http headers, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp.147-154, 2016. ,
A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks, Proceedings of 36th IEEE International Conference on Distributed Computing Systems Second IEEE International Workshop on Security Testing and Monitoring, p.2016, 2016. ,
A Novel Monitoring Solution for 6LoWPAN-based Wireless Sensor Networks, 2016 IEEE 22nd Asia-Pacific Conference on Communications (APCC), 2016. ,
Information-Theoretic Approach for Anomaly Detection: A Case Study in RPL-based Internet of Things, In EAI Endorsed Transactions on Security and Safety, p.2016 ,
Novel Learning Techniques for Anomaly Investigation and Detection in Large Scale, In Journal of Computers, p.2016 ,
Secure M2M Communication Monitoring in 6LoWPAN-based Wireless Sensor Networks, Wireless Networks: the journal of mobile communication, computation and information, p.2016 ,
Intrusion detection and intrusion tolerance for 6LoWPAN-based Wireless Sensor Networks, Intrusion Detection and Prevention for Mobile Ecosystems. CRC Series in Security, Privacy and Trust -Taylor & Francis, p.2016 ,
Intrusion-tolerant Routing in Wireless Sensor Networks, Journée sur la sécurité des SCADA et des infrastructures critiques, 2014. ,
Intrusion-tolerant Routing in Wireless Sensor Networks, French-Russian seminar on Software Verification, Testing and Quality Estimation, 2014. ,
Network Security Testing using MMT: A case study in IDOLE project, TAROT Summer School 2015, 2015. ,
Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers, Journées non thématiques RESCOM, 2016. ,
Security Monitoring for Network Protocols and Applications, TAROT Summer School 2016, 2016. ,
Events-Based Security Monitoring Using MMT Tool, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.860-863, 2012. ,
DOI : 10.1109/ICST.2012.188
INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, vol.29, issue.2, pp.216-230, 2006. ,
DOI : 10.1016/j.comcom.2005.05.018
URL : http://www.cs.colorado.edu/~rhan/INSENS.pdf
A survey on online monitoring approaches of computerbased systems, Centre for Software Reliability, 2009. ,
SNORT official homepage ,
Bro: a system for detecting network intruders in real-time, Proceedings of the 7th Conference on USENIX Security Symposium -Volume 7, ser. SSYM'98, pp.3-3, 1998. ,
DOI : 10.1016/S1389-1286(99)00112-7
Bro official homepage ,
Open Source Network-based Intrusion Detection System ,
A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems, 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp.122-127, 2012. ,
DOI : 10.1109/WAINA.2012.29
Open Source Network-based Intrusion Detection System ,
Evaluation studies of three intrusion detection systems under various attacks and rule sets, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), pp.6-9, 2013. ,
DOI : 10.1109/TENCON.2013.6718975
Analysis of techniques for building intrusion tolerant server systems, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp.729-734, 2003. ,
A Comparison of Intrusion-Tolerant System Architectures, IEEE Security & Privacy Magazine, vol.9, issue.4, pp.24-31, 2011. ,
DOI : 10.1109/MSP.2010.145
MMT-Security: User Guide. https://github.com/Montimage/MMT Security/blob/master/MMT Security User Guide.pdf, pp.5-09, 2013. ,
Estimation of QoE of video traffic using a fuzzy expert system, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.224-229, 2013. ,
DOI : 10.1109/CCNC.2013.6488450
URL : https://hal.archives-ouvertes.fr/hal-00816061
Advanced SQL Injection on user agent ,
The User Agent Field: Analyzing and Detecting the Abnormal or Malicious in your Organization, 2012. ,
XSS attacks via user-agent header, pp.5-09, 2011. ,
Top 10 web vulnerabilities in 2013, 2013. ,
Pytbull-IDS/IPS Testing Framework ,
SQL Injection through HTTP Headers Application Security, 2012. ,
Analyzing User-Agent Strings For Use In Real-World Detection Scenarios ,
List of User-Agents (Spiders, Robots, Crawler, Browser) ,
A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems, 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp.122-127, 2012. ,
DOI : 10.1109/WAINA.2012.29
Evaluation studies of three intrusion detection systems under various attacks and rule sets, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), pp.1-4, 2013. ,
DOI : 10.1109/TENCON.2013.6718975
Quantitative Analysis of Intrusion Detection Systems: Snort and SuricataClarkson University, 2011. ,
Internet of Things in Logistics, DHL Trend Research, vol.1, issue.1, pp.1-27, 2015. ,
The internet of things : key applications and protocols, 2012. ,
DOI : 10.1002/9781119958352
Standardized Protocol Stack for the Internet of (Important) Things, IEEE Communications Surveys & Tutorials, vol.15, issue.3, pp.1389-1406, 2013. ,
DOI : 10.1109/SURV.2012.111412.00158
The Analysis of 6LowPAN Technology, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, pp.963-966, 2008. ,
DOI : 10.1109/PACIIA.2008.72
RPL: The IP routing protocol designed for low power and lossy networks, In Internet Protocol for Smart Objects (IPSO) Alliance, p.20, 2011. ,
Managing 6LoWPAN sensors with CoAP on internet, 2015 23nd Signal Processing and Communications Applications Conference (SIU), pp.1389-1392, 2015. ,
DOI : 10.1109/SIU.2015.7130101
6LoWPAN Compressed DTLS for CoAP, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp.287-289, 2012. ,
DOI : 10.1109/DCOSS.2012.55
Network Monitoring Using MMT: An Application Based on the User-Agent Field in HTTP Headers, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp.147-154, 2016. ,
DOI : 10.1109/AINA.2016.41
SVELTE: Real-time intrusion detection in the Internet of Things, Ad Hoc Networks, pp.2661-2674, 2013. ,
DOI : 10.1016/j.adhoc.2013.04.014
Intrusion Detection Systems for Wireless Sensor Networks: A Survey, Communications in Computer and Information Science, issue.56, pp.234-241, 2009. ,
Denial-of-Service detection in 6LoWPAN based Internet of Things, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.600-607, 2013. ,
DOI : 10.1109/WiMOB.2013.6673419
DEMO: An IDS framework for internet of things empowered by 6LoWPAN, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1337-1340, 2013. ,
DOI : 10.1145/2508859.2512494
Pattern Recognition and Machine Learning (Information Science and Statistics), 2006. ,
A mathematical theory of communication, ACM SIGMOBILE Mobile Computing and Communications Review, vol.5, issue.1, pp.3-55, 2001. ,
DOI : 10.1145/584091.584093
IoT experimentation at a large scale ,
A Misbehavior Node Detection Algorithm for 6LoWPAN Wireless Sensor Networks, 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), p.2016, 2016. ,
DOI : 10.1109/ICDCSW.2016.11
Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique, International Conference on Networking and Services (ICNS '07), pp.83-83, 2007. ,
DOI : 10.1109/ICNS.2007.79
Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation, Proceedings of the 2008 Spring simulation multiconference, pp.836-843, 2008. ,
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks, pp.84-90, 2012. ,
A Taxonomy of Attacks in RPL-based Internet of Things, pp.459-473, 2016. ,
Intrusion-tolerance on the Internet (tolerance aux intrusions sur internet), " Presentation at LAAS-CNRS, 2005. ,
Security Modeling and Quantification of Intrusion Tolerant Systems Using Attack-response Graph, High Speed Networks, pp.297-308, 2004. ,
Analysis of techniques for building intrusion tolerant server systems, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp.729-734, 2003. ,
Fault and intrusion tolerance of wireless sensor networks, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, p.7, 2006. ,
DOI : 10.1109/IPDPS.2006.1639677
Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing ,
DOI : 10.1109/DASC.2006.30
INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, vol.29, issue.2, 2004. ,
DOI : 10.1016/j.comcom.2005.05.018
URL : http://www.cs.colorado.edu/~rhan/INSENS.pdf
An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network, Information and Automation ICIA 2008. International Conference on, pp.1547-1552, 2008. ,
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks, pp.349-364, 2003. ,
DOI : 10.1007/3-540-36978-3_23
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-5341016598314198, 2002. ,
DOI : 10.1145/381677.381696
Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002. ,
DOI : 10.1016/S1389-1286(01)00302-4
URL : http://www.ijcaonline.org/volume21/number4/pxc3873382.pdf
Directed diffusion for wireless sensor networking, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.2-16, 2003. ,
DOI : 10.1109/TNET.2002.808417
URL : https://cloudfront.escholarship.org/dist/prd/content/qt62p28371/qt62p28371.pdf
On Emulation-Based Network Intrusion Detection Systems, pp.384-404, 2014. ,
DOI : 10.1007/978-3-319-11379-1_19
Network?Level Polymorphic Shellcode Detection Using Emulation, pp.54-73, 2006. ,
DOI : 10.1007/s11416-006-0031-z
URL : http://s3g-mirror.malware-dmz.org/papers/nemu-dimva06.pdf
Defending against Web Application Vulnerabilities, Computer, vol.45, issue.2, pp.66-72, 2012. ,
DOI : 10.1109/MC.2011.259
SQL Injection Attacks and Defense Available: http://www.amazon.com/Injection-Attacks-Defense-Justin-Clarke, 2009. ,
Information-Theoretic Detection of SQL Injection Attacks, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, pp.40-47, 2012. ,
DOI : 10.1109/HASE.2012.31
Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey, International Journal on AdHoc Networking Systems (IJANS), pp.1-20, 2014. ,
Survey on security attacks in Vehicular Ad hoc Networks (VANETs), 6th International Conference on Signal Processing and Communication Systems (ICSPCS), pp.1-9, 2012. ,
Securing vehicular ad hoc networks, Journal of Computer Security, pp.39-68, 2007. ,
DOI : 10.3233/JCS-2007-15103
Secure and Privacy-preserving Protocols for VANETs, 2011. ,
Research on Security and Privacy in Vehicular Ad Hoc Networks, 2010. ,