On the vital areas of intrusion detection systems in wireless sensor networks

A Abduvaliyev, ASK Pathan, J Zhou… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs,
and presents a comprehensive classification of various IDS approaches according to their …

Detecting malicious data injections in wireless sensor networks: A survey

VP Illiano, EC Lupu - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Wireless Sensor Networks are widely advocated to monitor environmental parameters,
structural integrity of the built environment and use of urban spaces, services and utilities …

Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …

Optimizing learning in image retrieval

Y Rui, T Huang - … IEEE Conference on Computer Vision and …, 2000 - ieeexplore.ieee.org
Combining learning with vision techniques in interactive image retrieval has been an active
research topic during the past few years. However, existing learning techniques either are …

A robust trust establishment scheme for wireless sensor networks

F Ishmanov, SW Kim, SY Nam - Sensors, 2015 - mdpi.com
Security techniques like cryptography and authentication can fail to protect a network once a
node is compromised. Hence, trust establishment continuously monitors and evaluates node …

Gage‐free stress estimation of a beam‐like structure based on terrestrial laser scanning

HM Lee, HS Park - Computer‐Aided Civil and Infrastructure …, 2011 - Wiley Online Library
Terrestrial laser scanning (TLS) is a technique that remotely obtains the three‐dimensional
(3D) coordinates of an object using laser pulses. It is advantageous when used to obtain the …

A multilayer perceptron-based distributed intrusion detection system for internet of vehicles

A Anzer, M Elhadef - 2018 IEEE 4th international conference on …, 2018 - ieeexplore.ieee.org
Security of Internet of vehicles (IoV) is critical as it promises to provide with safer and secure
driving. IoV relies on VANETs which is based on V2V (Vehicle to Vehicle) communication …

Deep learning-based intrusion system for vehicular ad hoc networks

L Fei, Z Jiayan, S Jiaqi, E Szczerbicki - CMC-Computers Materials & …, 2020 - mostwiedzy.pl
The increasing use of the Internet with vehicles has made travel more convenient. However,
hackers can attack intelligent vehicles through various technical loopholes, resulting in a …

High performance adaptive system for cyber attacks detection

M Komar, V Kochan, L Dubchak… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
To increase the security of intrusion detection system, generalized structure of highly
performance adaptive system for cyber attacks detection was developed. To improve its …

A neural-visualization IDS for honeynet data

A Herrero, U Zurutuza, E Corchado - International Journal of Neural …, 2012 - World Scientific
Neural intelligent systems can provide a visualization of the network traffic for security staff,
in order to reduce the widely known high false-positive rate associated with misuse-based …