A malicious pattern detection engine for embedded security systems in the Internet of Things

D Oh, D Kim, WW Ro - Sensors, 2014 - mdpi.com
With the emergence of the Internet of Things (IoT), a large number of physical objects in
daily life have been aggressively connected to the Internet. As the number of objects …

A comparative study of anomaly detection techniques for smart city wireless sensor networks

V Garcia-Font, C Garrigues, H Rifà-Pous - sensors, 2016 - mdpi.com
In many countries around the world, smart cities are becoming a reality. These cities
contribute to improving citizens' quality of life by providing services that are normally based …

Improving SIEM alert metadata aggregation with a novel kill-chain based classification model

BD Bryant, H Saiedian - Computers & Security, 2020 - Elsevier
Today's information networks face increasingly sophisticated and persistent threats, where
new threat tools and vulnerability exploits often outpace advancements in intrusion detection …

Hierarchical anomaly based intrusion detection and localization in IoT

A Yahyaoui, T Abdellatif, R Attia - 2019 15th International …, 2019 - ieeexplore.ieee.org
In IoT systems, WSNs and Gateways are exposed to many attacks. WSNs are usually
exposed to different types of intrusions like node compromise and denial of service attacks …

A comparative experimental design and performance analysis of snort-based intrusion detection system in practical computer networks

I Karim, QT Vien, TA Le, G Mapp - Computers, 2017 - mdpi.com
As one of the most reliable technologies, network intrusion detection system (NIDS) allows
the monitoring of incoming and outgoing traffic to identify unauthorised usage and …

Quantal Response Equilibrium‐Based Strategies for Intrusion Detection in WSNs

S Shen, K Hu, L Huang, H Li, R Han… - Mobile Information …, 2015 - Wiley Online Library
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to
guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor …

The protocol design and New approach for SCADA security enhancement during sensors broadcasting system

A Shahzad, M Lee, C Lee, N Xiong, S Kim… - Multimedia Tools and …, 2016 - Springer
Several security mechanisms have been investigated and deployed that provide protection
for real time platforms. Each security mechanism is contributed to enhance the SCADA …

Energy-efficient virtual infrastructure based geo-nested routing protocol forwireless sensor networks

B Varadharajan, S Gopalakrishnan… - Turkish Journal of …, 2021 - journals.tubitak.gov.tr
The wireless sensor networks (WSN) are comprised of hundreds to thousands of compact
and battery-operated sensor nodes. The deployed sensor nodes are widely used to sense …

Highly secure mobile devices assisted with trusted cloud computing environments

D Oh, I Kim, K Kim, SM Lee, WW Ro - ETRI Journal, 2015 - Wiley Online Library
Mobile devices have been widespread and become very popular with connectivity to the
Internet, and a lot of desktop PC applications are now aggressively ported to them …

GABs: A game-based secure and energy efficient data aggregation for wireless sensor networks

TD Engouang, Y Liu, Z Zhang - International Journal of …, 2015 - journals.sagepub.com
This paper endeavors to investigate the security and energy issues in wireless sensor
networks from prior art such as game theory and various embodiments of methods like …