A malicious pattern detection engine for embedded security systems in the Internet of Things
With the emergence of the Internet of Things (IoT), a large number of physical objects in
daily life have been aggressively connected to the Internet. As the number of objects …
daily life have been aggressively connected to the Internet. As the number of objects …
A comparative study of anomaly detection techniques for smart city wireless sensor networks
In many countries around the world, smart cities are becoming a reality. These cities
contribute to improving citizens' quality of life by providing services that are normally based …
contribute to improving citizens' quality of life by providing services that are normally based …
Improving SIEM alert metadata aggregation with a novel kill-chain based classification model
BD Bryant, H Saiedian - Computers & Security, 2020 - Elsevier
Today's information networks face increasingly sophisticated and persistent threats, where
new threat tools and vulnerability exploits often outpace advancements in intrusion detection …
new threat tools and vulnerability exploits often outpace advancements in intrusion detection …
Hierarchical anomaly based intrusion detection and localization in IoT
A Yahyaoui, T Abdellatif, R Attia - 2019 15th International …, 2019 - ieeexplore.ieee.org
In IoT systems, WSNs and Gateways are exposed to many attacks. WSNs are usually
exposed to different types of intrusions like node compromise and denial of service attacks …
exposed to different types of intrusions like node compromise and denial of service attacks …
A comparative experimental design and performance analysis of snort-based intrusion detection system in practical computer networks
As one of the most reliable technologies, network intrusion detection system (NIDS) allows
the monitoring of incoming and outgoing traffic to identify unauthorised usage and …
the monitoring of incoming and outgoing traffic to identify unauthorised usage and …
Quantal Response Equilibrium‐Based Strategies for Intrusion Detection in WSNs
S Shen, K Hu, L Huang, H Li, R Han… - Mobile Information …, 2015 - Wiley Online Library
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to
guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor …
guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor …
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system
Several security mechanisms have been investigated and deployed that provide protection
for real time platforms. Each security mechanism is contributed to enhance the SCADA …
for real time platforms. Each security mechanism is contributed to enhance the SCADA …
Energy-efficient virtual infrastructure based geo-nested routing protocol forwireless sensor networks
B Varadharajan, S Gopalakrishnan… - Turkish Journal of …, 2021 - journals.tubitak.gov.tr
The wireless sensor networks (WSN) are comprised of hundreds to thousands of compact
and battery-operated sensor nodes. The deployed sensor nodes are widely used to sense …
and battery-operated sensor nodes. The deployed sensor nodes are widely used to sense …
Highly secure mobile devices assisted with trusted cloud computing environments
Mobile devices have been widespread and become very popular with connectivity to the
Internet, and a lot of desktop PC applications are now aggressively ported to them …
Internet, and a lot of desktop PC applications are now aggressively ported to them …
GABs: A game-based secure and energy efficient data aggregation for wireless sensor networks
TD Engouang, Y Liu, Z Zhang - International Journal of …, 2015 - journals.sagepub.com
This paper endeavors to investigate the security and energy issues in wireless sensor
networks from prior art such as game theory and various embodiments of methods like …
networks from prior art such as game theory and various embodiments of methods like …