This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
—In this paper, we study the election of multiple leaders for intrusion detection in the presence of selfish nodes in mobile ad hoc networks (MANETs). To balance the resource co...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
—Modeling and simulation can be powerful tools for analyzing multi-agent systems, such as networked robotic systems and sensor networks. In this paper, it is shown concretely how...
Christopher M. Cianci, Thomas Lochmatter, Jim Pugh...
—A common application of unattended sensor networks (WSN) is low data rate streaming from many scattered sensors to one or more sink nodes. To meet the stringent requirement of p...
Zvi Rosberg, Ren Ping Liu, Alex Y. Dong, Tuan D. L...
—Available algorithms for the distributed construction of connected dominating sets in mobile ad hoc networks are inapplicable or suffer from a high complexity. This is mainly du...