[PDF][PDF] Event driven adaptive security in internet of things

W Aman, E Snekkenes - … of the Eighth International Conference on …, 2014 - researchgate.net
With Internet of Things (IoT), new and improved personal, commercial and social
opportunities can be explored and availed. However, with this extended network, the …

Dynamic reconfiguration of intrusion detection systems

J Stiborek - 2017 - search.proquest.com
Intrusion detection systems (IDS) used in network security are complex solutions that require
precise tuning prior to their deployment. Such tuning, however, is a problem. If done …

On intrusion detection matching algorithm from the perspective of multi-agent

JH Wang, YF Dong, HF Liu - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Intrusion detection process is such a process as based on connection requests accepted by
the computer, searching and matching the intrusion in abnormity request sets of the existing …

Impact of incomplete knowledge on scanning strategy

A Garnaev, W Trappe - 2015 IEEE International Workshop on …, 2015 - ieeexplore.ieee.org
Security is a fundamental problem facing wireless systems employing spectrum sharing, and
thus scanning algorithms are used to detect malicious or illegal activity in such systems. A …

Spectrum scanning when the intruder might have knowledge about the scanner's capabilities

A Garnaev, W Trappe, D Stojadinovic… - … on Acoustics, Speech …, 2015 - ieeexplore.ieee.org
Detecting malicious users in dynamic spectrum access scenarios is a crucial problem that
requires an intrusion detection system (IDS) that scans spectrum for malicious activities. In …