An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

An intrusion detection system for internet of medical things

G Thamilarasu, A Odesile, A Hoang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is making strong advances in healthcare with the promise of
transformation in technological, social and economic prospects, paving the way for a healthy …

Collaborative trust aware intelligent intrusion detection in VANETs

N Kumar, N Chilamkurti - Computers & Electrical Engineering, 2014 - Elsevier
Abstract Trust aware Collaborative Learning Automata based Intrusion Detection System (T-
CLAIDS) for VANETs is proposed in this paper. Learning Automata (LA) are assumed to be …

Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks

A Gupta, OJ Pandey, M Shukla… - 2013 IEEE …, 2013 - ieeexplore.ieee.org
The emerging trend of ubiquitous and pervasive computing aims at embedding everyday
devices such as wrist-watches, smart phones, home video systems, autofocus cameras …

Distributed intrusion detection using mobile agents in wireless body area networks

A Odesile, G Thamilarasu - 2017 Seventh International …, 2017 - ieeexplore.ieee.org
Technological advances in wearable and implanted medical devices are enabling wireless
body area networks to alter the current landscape of medical and healthcare applications …

A new taxonomy of insider threats: an initial step in understanding authorised attack

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - International …, 2018 - inderscienceonline.com
Insider threat represents one of the greatest challenges in the cyber security world. Insider
attackers have more privileged and legitimate access to the information and facilities …

Autonomous mobile agent based intrusion detection framework in wireless body area networks

G Thamilarasu, Z Ma - … IEEE 16th international symposium on a …, 2015 - ieeexplore.ieee.org
Wireless body area networks (WBAN) are revolutionizing healthcare with their great
potential to perform cost-effective, unobtrusive and constant real-time monitoring of health …

Wireless smart home sensor networks: mobile agent based anomaly detection

M Usman, V Muthukkumarasamy… - … and Computing and …, 2012 - ieeexplore.ieee.org
Pervasive computing is changing the life style of human being in the 21st century. Smart
home is one of the emerging examples for pervasive computing applications. In a smart …

[图书][B] Security for Multihop Wireless Networks

S Khan, JL Mauri, S Adibi - 2014 - api.taylorfrancis.com
First of all, we would like to express our gratitude to the publisher Taylor & Francis for giving
us full support in the timely completion of this book. We also thank all the authors for their …

Hybrid architecture with misuse and anomaly detection techniques for wireless networks

EV Balan, MK Priyan, C Gokulnath… - … on communications and …, 2015 - ieeexplore.ieee.org
The growing utilization of Internet administration in the recent years has facilitated an
increment in the various types of attacks. Despite the best protection measures, many …