A systematic state-of-the-art analysis of multi-agent intrusion detection

IA Saeed, A Selamat, MF Rohani, O Krejcar… - IEEE …, 2020 - ieeexplore.ieee.org
Multi-agent architectures have been successful in attaining considerable attention among
computer security researchers. This is so, because of their demonstrated capabilities such …

Machine Learning-Based DoS Attack Detection Techniques in Wireless Sensor Network: A Review

HS Sharma, MM Singh, A Sarkar - Proceedings of the International …, 2023 - Springer
In diverse areas, the wireless sensor network (WSN) has an important role to play and has
its application in various domains. Even though WSN has become very popular in recent …

A systematic review on various attack detection methods for wireless sensor networks

K Jane Nithya, K Shyamala - … : Proceedings of ICICC 2021, Volume 3, 2022 - Springer
Wireless sensor network (WSN) is implemented using low priced sensor nodes. These
nodes are constrained in terms or memory, battery life, and computations. WSNs can …

A networked multirobot CPS with artificial immune fuzzy optimization for distributed formation control of embedded mobile robots

SSD Xu, HC Huang, YC Kung… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This article presents a networked multirobot cyber-physical system (CPS) that employs
artificial immune fuzzy optimization to achieve distributed formation control of embedded …

Reliability evaluation for clustered WSNs under malware propagation

S Shen, L Huang, J Liu, AC Champion, S Yu, Q Cao - Sensors, 2016 - mdpi.com
We consider a clustered wireless sensor network (WSN) under epidemic-malware
propagation conditions and solve the problem of how to evaluate its reliability so as to …

Evaluation of the performance of supervised and unsupervised Machine learning techniques for intrusion detection

FG Portela, FA Mendoza… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Nowadays machine learning techniques are widely used in the research for intelligent
solutions anomalies detection on different computers and communications systems, which …

Game-theoretic actor–critic-based intrusion response scheme (gtac-irs) for wireless sdn-based iot networks

B Wang, Y Sun, M Sun, X Xu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In the era of the Internet of Things (IoT), reinforcement learning (RL)-based techniques are
promising candidates to handle the intrusion response through the interaction between the …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

A cooperative game framework for detecting overlapping communities in social networks

A Jonnalagadda, L Kuppusamy - Physica A: Statistical Mechanics and its …, 2018 - Elsevier
Community detection in social networks is a challenging and complex task, which received
much attention from researchers of multiple domains in recent years. The evolution of …

GA‐DoSLD: genetic algorithm based denial‐of‐sleep attack detection in WSN

M Gunasekaran… - Security and …, 2017 - Wiley Online Library
Denial‐of‐sleep (DoSL) attack is a special category of denial‐of‐service attack that prevents
the battery powered sensor nodes from going into the sleep mode, thus affecting the network …