Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things

D Midi, A Rullo, A Mudgerikar… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
In this paper, we introduce Kalis, a self-adapting, knowledge-driven expert Intrusion
Detection System able to detect attacks in real time across a wide range of IoT systems …

Clone node detection attacks and mitigation mechanisms in static wireless sensor networks

JR Dora, K Nemoga - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
The development of the wireless sensor networks technology commonly named WSNs has
been gaining a significantly increased amount of attention from researchers over the last few …

Kalis2. 0-a SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for the IoT

A Rullo, D Midi, A Mudjerikar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The wide variety of application domains makes the Internet of Things (IoT) quite unique
among other types of computer networks: IoT networks can be made of devices of different …

Facial expression recognition based on liquid state machines built of alternative neuron models

BJ Grzyb, E Chinellato, GM Wojcik… - 2009 International joint …, 2009 - ieeexplore.ieee.org
This paper presents an approach to facial expression recognition based on the theory of
liquid computing. Up to date, no emotion recognition systems based on spiking neural …

[PDF][PDF] Mitigation of Replication Attack Detection in Clusters through a Mobile Agent in Wireless Sensor Networks

DR Kumar, R Sathish - International Journal of Engineering …, 2013 - academia.edu
Among the several other attacks that threatens the security of the Wireless Sensor Networks
(WSNs) node replication attack seems to be very harmful ifz present in the network …

[PDF][PDF] Trust based node replication attack detection protocol for wireless sensor networks

V Manjula, C Chellappan - Journal of Computer Science, 2012 - Citeseer
The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack,
where one or more node (s) illegitimately claims an identity, are also called clone attack due …

Detection of clone node attack in mobile wireless sensor network with optimised cost function

MH Ansari, VT Vakili - International Journal of Sensor …, 2017 - inderscienceonline.com
Clone attack is considered as the most important security challenge of wireless sensor
networks. In this paper, an innovative distributed approach for the detection of clone node …

Dynamic detection of node replication attacks using X-RED in wireless sensor networks

P Abinaya, C Geetha - International Conference on Information …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks often deployed in hostile environments, where an attacker can
also capture some nodes. Once a node is captured, the attacker can re-program it and start …

An overview of outlier detection technique developed for wireless sensor networks

O Ghorbel, MW Jmal, W Ayedi… - … Multi-Conferences on …, 2013 - ieeexplore.ieee.org
Outliers in wireless sensor networks are measurements that deviate from the normal model
of sensed data and result from errors, events or malicious attacks on the network. The …

[PDF][PDF] Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks

M Ansari, V TabatabaVakily - International Journal of Scientific and …, 2012 - academia.edu
In this paper, regarding accelerating development of mobile sensor nodes technology and
increasing the utilization of them and alsothese networks are faced with security challenges; …