Recent advancements in intrusion detection systems for the internet of things

ZA Khan, P Herrmann - Security and Communication Networks, 2019 - Wiley Online Library
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with
severe processor and energy restrictions. Often, the limited processing resources do not …

DoS attack prevention technique in wireless sensor networks

S Patil, S Chaudhari - Procedia Computer Science, 2016 - Elsevier
Abstract Wireless Sensor Networks (WSN) has wide applications in data gathering and data
transmission via wireless networks. Due to the weaknesses in the WSN, the sensor nodes …

Broad learning with reinforcement learning signal feedback: Theory and applications

R Mao, R Cui, CLP Chen - IEEE Transactions on Neural …, 2021 - ieeexplore.ieee.org
Broad learning systems (BLSs) have attracted considerable attention due to their powerful
ability in efficient discriminative learning. In this article, a modified BLS with reinforcement …

Identify selective forwarding attacks using danger model: Promote the detection accuracy in wireless sensor networks

X Huang, Y Wu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are prone to attack due to open work conditions and
broadcast communication. The selective forwarding attack, one of the inner attacks in WSNs …

Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model

S Balaji, EG Julie, YH Robinson, R Kumar… - Computer Standards & …, 2019 - Elsevier
Security is a crucial factor in Mobile Ad hoc Networks (MANET) where inaccessible
environments cause assorted categories of security intimidations to provide the malicious …

Network layer attacks and countermeasures in cognitive radio networks: A survey

M Bouabdellah, N Kaabouch, F El Bouanani… - Journal of information …, 2018 - Elsevier
Spectrum scarcity is the principal motivation behind the development of cognitive radio. This
technology introduces new functionalities at the physical, medium access control, and …

[PDF][PDF] Benchmark Datasets for Network Intrusion Detection: A Review.

Y Hamid, VR Balasaraswathi, L Journaux… - Int. J. Netw …, 2018 - researchgate.net
Abstract Network Intrusion Detection is the process of monitoring the events occurring in a
computer system or the network and analyzing them for the signs of possible intrusions. An …

On the reliability of industrial internet of things from systematic perspectives: Evaluation approaches, challenges, and open issues

DS Kim, TD Hoa, HT Thien - IETE Technical Review, 2022 - Taylor & Francis
In the light of Industry 4.0 revolution, the Industrial Internet of Things (IIoT) allows digitalizing
manufacturing processes and increasing the digital connectivity and automation in the smart …

Outlier detection for wireless sensor networks using density‐based clustering approach

A Abid, A Kachouri, A Mahfoudhi - IET Wireless Sensor …, 2017 - Wiley Online Library
Outlier detection (OD) constitutes an important issue for many research areas namely data
mining, medicines, and sensor networks. It is helpful mainly in identifying intrusion, fraud …

Retracted article: adapting project management method and ANFIS strategy for variables selection and analyzing wind turbine wake effect

D Petković, SH Ab Hamid, Ž Ćojbašić, NT Pavlović - Natural hazards, 2014 - Springer
We present a project management methodology designed for the selection of wind turbines
wake effect most influential parameters, who need to run wind farm project for large energy …