On the credibility of wireless sensor network simulations: Evaluation of intrusion detection system

被引:0
|
作者
Faculty of Informatics, Masaryk University, Czech Republic [1 ]
机构
来源
SIMUTools - Int. Conf. Simul. Tools Techniques | / 75-84期
关键词
Compendex;
D O I
5th International Conference on Simulation Tools and Techniques, SIMUTools 2012
中图分类号
学科分类号
摘要
Intrusion detection
引用
收藏
相关论文
共 50 条
  • [31] Improving performance of a Java-based platform for Wireless Sensor Network applications
    Flammini, A.
    Rinaldi, S.
    Casalegno, F.
    Telhan, O.
    2010 IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2010 - Proceedings, 2010, : 1618 - 1623
  • [32] Optimal jamming attack strategies and network defense policies in wireless sensor networks
    Boeing Research and Technology, Boeing Company, MC 7L-69, PO Box 3707, Seattle, WA 98124-2207, United States
    不详
    不详
    不详
    IEEE Trans. Mob. Comput., 8 (1119-1133):
  • [33] A comparative study on available IPv6 platforms for wireless sensor network
    Sarwar, Usman
    Rao, Gopinath Sinniah
    Suryady, Zeldi
    Khoshdelniat, Reza
    World Academy of Science, Engineering and Technology, 2010, 38 : 889 - 892
  • [34] Wireless Sensor Network Hop Count Theory Modeling and Deep Learning Prediction
    Sati, Salem Omar
    Abugharsa, Afif
    2024 IEEE 4th International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering, MI-STA 2024 - Proceeding, 2024, : 124 - 129
  • [35] A Novel Dynamic Routing Approach to Distributed Wireless Sensor Network in Aircraft Environment
    Sun, Hui
    Bai, Chengrui
    Li, Yahui
    Yang, Kaixin
    COMPLEXITY, 2021, 2021
  • [36] Analysis of the evaluation index for jamming partition battlefield wireless network
    Niu, Zhao
    Ma, Tao
    Ma, Chunlai
    Huang, Jun
    Proceedings of 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2019, 2019, : 2438 - 2442
  • [37] An underground Mobile Wireless Sensor Network routing protocol for coal mine environment
    College of Electrical and Information Engineering, Lanzhou University of Technology, Lanzhou 730050, China
    不详
    J. Comput. Inf. Syst., 7 (2487-2495):
  • [38] Machine Learning and Deep Learning Architectures for Intrusion Detection System (IDS): A Survey
    Thankappan, Manesh
    Narayanan, Nikhil
    Sanaj, M.S.
    Manoj, Anusha
    Menon, Aravind P.
    Gokul Krishna, M.
    2024 1st International Conference on Trends in Engineering Systems and Technologies, ICTEST 2024, 2024,
  • [39] Applying an improved wireless sensor scheduling algorithm to library surveillance system
    Xu, J., 1600, Northwestern Polytechnical University (31):
  • [40] Coverage restoration method for wireless sensor networks of distributed PV system
    Fu, Zhixin
    Liu, Zhen
    Yuan, Yue
    Zhao, Min
    Li, Qiaomu
    International Journal of Distributed Sensor Networks, 2015, 2015