[PDF][PDF] Network intrusion detection system by using genetic algorithm
Developing a better intrusion detection systems (IDS) has attracted many researchers in the
area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is …
area of computer network for the past decades. In this paper, Genetic Algorithm (GA) is …
RETRACTED ARTICLE: Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad …
S Jagadeesan, V Parthasarathy - Cluster Computing, 2019 - Springer
Various malicious activities are still making lot of problems in all kind of networks. Some of
the malicious activities can be controlled and some can't be, whereas controlling the …
the malicious activities can be controlled and some can't be, whereas controlling the …
Network intrusion detection system using artificial immune system (AIS)
SI Suliman, MS Abd Shukor, M Kassim… - … on Computer and …, 2018 - ieeexplore.ieee.org
The number of computer network attacks are increasing due to the global use of Internet in
our daily life. This has led to the increased risks of data stealing, hacking, privacy intrusion …
our daily life. This has led to the increased risks of data stealing, hacking, privacy intrusion …
[PDF][PDF] Genetic algorithm for intrusion detection system in computer network
Internet connection nowadays has become one of the essential requirements to execute our
daily activities effectively. Among the major applications of wide Internet connections is local …
daily activities effectively. Among the major applications of wide Internet connections is local …
Improved Security-Based Model for Heterogeneous Wireless Sensor Networks Using the Dispense Incline Drop Algorithm
M Lakshmi, CR Prashanth - IETE Journal of Research, 2024 - Taylor & Francis
Numerous real-time applications rely on heterogeneous wireless sensor networks (HWSNs),
including the Internet of Vehicles (IoV), Internet of Sensors (IoS), medical applications, and …
including the Internet of Vehicles (IoV), Internet of Sensors (IoS), medical applications, and …
Intrusion detection and prevention system for wireless sensor network using machine learning: a comprehensive survey and discussion
PR Chandre, PN Mahalle, GR Shinde… - Handbook on ICT in …, 2022 - api.taylorfrancis.com
202 Intrusion Detection and Prevention System for Wireless Sensor Network forms. Intrusion
is one amongst the vital problems, and intrusion detection has already reached to the …
is one amongst the vital problems, and intrusion detection has already reached to the …
A survey of intrusion detection systems in wireless sensor networks
E Darra, SK Katsikas - Intrusion Detect. Prev. Mob. Ecosyst, 2017 - api.taylorfrancis.com
A wireless sensor network (WSN) is a spatially distributed network of a few tens to
thousands autonomous sensor nodes that monitor physical or environmental conditions …
thousands autonomous sensor nodes that monitor physical or environmental conditions …
A novel weight-based leader election approach for split brain in distributed system
F Jiang, Y Cheng, C Dong, E Yu - IOP Conference Series …, 2020 - iopscience.iop.org
The rapid development of High Availability (HA) system has attracted growing attention from
both industry and academia. Due to the network and hardware failure, a complete system …
both industry and academia. Due to the network and hardware failure, a complete system …
[PDF][PDF] Selecting IOT WSNIDS Based on Metrics User Necessity Weight Approach
ABSTRACT Internet of Things (IoT) WSNIDS is a network security software that is built for
detection of vulnerability exploits against attacks. The choice of WSNIDS depends on the IoT …
detection of vulnerability exploits against attacks. The choice of WSNIDS depends on the IoT …
[图书][B] Network Security by Preventing DDOS Attack Using Honeypot
S Rajalakshmi - 2017 - search.proquest.com
Abstract Basically, Intrusion Detection System (IDS) is introduced in the modern environment
in order to secure the system that works in terms of signature, where they are not fit for …
in order to secure the system that works in terms of signature, where they are not fit for …