A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

A survey of game theory as applied to network security

S Roy, C Ellis, S Shiva, D Dasgupta… - 2010 43rd Hawaii …, 2010 - ieeexplore.ieee.org
Network security is a complex and challenging problem. The area of network defense
mechanism design is receiving immense attention from the research community for more …

Game theory for network security

X Liang, Y Xiao - IEEE Communications Surveys & Tutorials, 2012 - ieeexplore.ieee.org
As networks become ubiquitous in people's lives, users depend on networks a lot for
sufficient communication and convenient information access. However, networks suffer from …

A survey on intrusion detection and prevention in wireless ad-hoc networks

K Khan, A Mehmood, S Khan, MA Khan, Z Iqbal… - Journal of Systems …, 2020 - Elsevier
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …

A game theoretic investigation of deception in network security

TE Carroll, D Grosu - Security and Communication Networks, 2011 - Wiley Online Library
We perform a game theoretic investigation of the effects of deception on the interactions
between an attacker and a defender of a computer network. The defender can employ …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis

TH Nguyen, M Wright, MP Wellman… - Proceedings of the 2017 …, 2017 - dl.acm.org
We study the problem of allocating limited security countermeasures to protect network data
from cyber-attacks, for scenarios modeled by Bayesian attack graphs. We consider multi …

Recent advancements in intrusion detection systems for the internet of things

ZA Khan, P Herrmann - Security and Communication Networks, 2019 - Wiley Online Library
Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with
severe processor and energy restrictions. Often, the limited processing resources do not …

Synergy of building cybersecurity systems

S Yevseiev, V Ponomarenko, O Laptiev, O Milov… - 2021 - papers.ssrn.com
The development of the modern world community is closely related to advances in
computing resources and cyberspace. The formation and expansion of the range of services …

Nature-inspired techniques in the context of fraud detection

M Behdad, L Barone, M Bennamoun… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Electronic fraud is highly lucrative, with estimates suggesting these crimes to be worth
millions of dollars annually. Because of its complex nature, electronic fraud detection is …