Sciweavers

511 search results - page 17 / 103
» Anomaly-Based Intrusion Detection Algorithms for Wireless Ne...
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
WIMOB
2008
IEEE
14 years 1 months ago
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...
ACSC
2005
IEEE
14 years 1 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ICC
2007
IEEE
188views Communications» more  ICC 2007»
14 years 1 months ago
Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks
—In our previous work [11], we derived detection delay and detection probability for a randomized scheduling algorithm in wireless sensor networks. In this paper, we study asympt...
Yang Xiao, Ying Zhang, Xinyu Sun, Hui Chen
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 6 months ago
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
—Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications. These networks have the pot...
Jaydip Sen, Kaustav Goswami