[PDF][PDF] Enhanced soft computing approaches for intrusion detection schemes in social media networks

A Sathesh - Journal of Soft Computing Paradigm (JSCP), 2019 - researchgate.net
The soft computing methods play a vital role in identifying the malicious activities in the
social network. The low cost solutions and the robustness provided by the soft computing in …

DoS attack prevention technique in wireless sensor networks

S Patil, S Chaudhari - Procedia Computer Science, 2016 - Elsevier
Abstract Wireless Sensor Networks (WSN) has wide applications in data gathering and data
transmission via wireless networks. Due to the weaknesses in the WSN, the sensor nodes …

A flow-based multi-agent data exfiltration detection architecture for ultra-low latency networks

RS Marques, G Epiphaniou, H Al-Khateeb… - ACM Transactions on …, 2021 - dl.acm.org
Modern network infrastructures host converged applications that demand rapid elasticity of
services, increased security, and ultra-fast reaction times. The Tactile Internet promises to …

Bio-inspired solutions for optimal management in wireless sensor networks

AAA Ari - 2016 - theses.hal.science
During the past few years, wireless sensor networks witnessed an increased interest in both
the industrial and the scientific community due to the potential wide area of applications …

[PDF][PDF] THE COOPERATIVE-BASED FUZZY ARTIFICIAL IMMUNE SYSTEM USING WIRELESS SENSOR NETWORK

S Sriramulu - ijcse.com
Wireless Sensor Networks are used in favour of a extensive diversity of data collecting and
transmission applications using wireless networks. Because of the WSN's weaknesses …

[引用][C] Dynamic Ch Selection And Intrusion Detection In Wsn Using Reinforced Weighted Approximation Based Adaptive Seech An Optimized Routing Framework

R Sandhya - 2017 - shodhganga.inflibnet.ac.in
Shodhganga@INFLIBNET: Dynamic Ch Selection And Intrusion Detection In Wsn Using
Reinforced Weighted Approximation Based Adaptive Seech An Optimized Routing Framework …

[引用][C] Intrusion Detection and Prevention in WSN and MANET using Machine Learning Techniques and Existing Challenges

MV Pawar, J Anuradha - International Journal of Advanced Science and …, 2020

[引用][C] Fuzzy Logic in Secure WSN: A Review

[引用][C] A Survey On Intrusion Detection System In Wireless Sensor Networks

K Saranya, D Sathya, PG Kumar