Search Results

There are 79398 results for: content related to: An efficient intrusion detection framework in cluster-based wireless sensor networks

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  3. Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1292–1309, Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee and Ki-Hyung Kim

    Version of Record online : 13 MAY 2014, DOI: 10.1002/sec.1023

  4. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach

    International Journal of Communication Systems

    Volume 25, Issue 9, September 2012, Pages: 1189–1212, Anhtuan Le, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash and Yuan Luo

    Version of Record online : 23 MAY 2012, DOI: 10.1002/dac.2356

  5. A novel sine-curve mobility model for intrusion detection in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 13, Issue 17, 10 December 2013, Pages: 1555–1570, Yun Wang, Yoon Kah Leow and Jun Yin

    Version of Record online : 10 NOV 2011, DOI: 10.1002/wcm.1202

  6. A framework for intrusion detection system in advanced metering infrastructure

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 195–205, Nasim Beigi Mohammadi, Jelena Mišić, Vojislav B. Mišić and Hamzeh Khazaei

    Version of Record online : 28 NOV 2012, DOI: 10.1002/sec.690

  7. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  8. Network intrusion detection using hybrid binary PSO and random forests algorithm

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2646–2660, Arif Jamal Malik, Waseem Shahzad and Farrukh Aslam Khan

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.508

  9. An intrusion detection method for wireless sensor network based on mathematical morphology

    Security and Communication Networks

    Yanwen Wang, Xiaoling Wu and Hainan Chen

    Version of Record online : 11 FEB 2015, DOI: 10.1002/sec.1181

  10. Dynamic malicious node detection with semi-supervised multivariate classification in cognitive wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 12, 25 August 2015, Pages: 2910–2923, Hongjun Dai, Huabo Liu and Zhiping Jia

    Version of Record online : 21 JUL 2014, DOI: 10.1002/cpe.3338

  11. Distributed monitoring for misbehaviour detection in wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 388–400, Khelifa Benahmed, Madjid Merabti and Hafid Haffaf

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.624

  12. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1074

  13. On providing wormhole-attack-resistant localization using conflicting sets

    Wireless Communications and Mobile Computing

    Volume 15, Issue 15, 25 October 2015, Pages: 1865–1881, Honglong Chen, Wei Lou and Zhi Wang

    Version of Record online : 21 JAN 2014, DOI: 10.1002/wcm.2462

  14. A survey on security and privacy issues in Wireless Mesh Networks

    Security and Communication Networks

    Aggeliki Sgora, Dimitrios D. Vergados and P. Chatzimisios

    Version of Record online : 12 SEP 2013, DOI: 10.1002/sec.846

  15. Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 58–68, Tao Gong and Bharat Bhargava

    Version of Record online : 26 APR 2012, DOI: 10.1002/sec.530

  16. Intrusion detection alert management for high-speed networks: current researches and applications

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4362–4372, Hassen Sallay and Sami Bourouis

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1366

  17. A lightweight intrusion detection framework for wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 10, Issue 4, April 2010, Pages: 559–572, Tran Hoang Hai, Eui-Nam Huh and Minho Jo

    Version of Record online : 15 APR 2009, DOI: 10.1002/wcm.785

  18. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  19. Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks

    Transactions on Emerging Telecommunications Technologies

    Volume 23, Issue 4, June 2012, Pages: 303–316, Nabila Labraoui, Mourad Gueroui and Makhlouf Aliouat

    Version of Record online : 22 DEC 2011, DOI: 10.1002/ett.1532

  20. Initial conditions or emergence: What determines dissolution patterns in rough fractures?

    Journal of Geophysical Research: Solid Earth

    Volume 120, Issue 9, September 2015, Pages: 6102–6121, Virat K. Upadhyay, Piotr Szymczak and Anthony J. C. Ladd

    Version of Record online : 21 SEP 2015, DOI: 10.1002/2015JB012233