-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey, Computer Networks," vol. 38, no. 4, 2001, pp. 393-422. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
13544269338
-
Application of SVM and 54 ANN for intrusion detection
-
W. H. Chen, S. H. Hsu, and H. P. Shen, "Application of SVM and 54 ANN for intrusion detection," Computers & Operations Research, vol. 32, 2005, pp. 2617-2634.
-
(2005)
Computers & Operations Research
, vol.32
, pp. 2617-2634
-
-
Chen, W.H.1
Hsu, S.H.2
Shen, H.P.3
-
4
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
-
N. Toosi, and M. Kahani, "A New Approach to Intrusion detection Based on An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers," Computer Communications, vol. 30, no. 10, 2007, pp. 2201-2212. (Pubitemid 47094963)
-
(2007)
Computer Communications
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
5
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis and Defenses," Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, 2004, pp. 259-268.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
6
-
-
39149117388
-
Threshold-based intrusion detection in ad hoc networks and secure AODV
-
DOI 10.1016/j.adhoc.2007.05.001, PII S1570870507000960
-
J. Patwardhan, M. Parker, A. Iorga, T. Joshi, Karygiannis and Y. Yesha, "Threshold-based Intrusion Detection in Ad-hoc Networks and Secure AODV," Ad Hoc Networks, vol. 6, no. 4, 2008, pp. 578-599. (Pubitemid 351258394)
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.4
, pp. 578-599
-
-
Patwardhan, A.1
Parker, J.2
Iorga, M.3
Joshi, A.4
Karygiannis, T.5
Yesha, Y.6
-
7
-
-
33646156614
-
Web page classification based on a support vector machine
-
R. C. Chen and C. H. Hsieh, "Web Page Classification Based on A Support Vector Machine," Expert System with Applications, vol. 31, 2006, pp. 427-435.
-
(2006)
Expert System with Applications
, vol.31
, pp. 427-435
-
-
Chen, R.C.1
Hsieh, C.H.2
-
8
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
M. Depren, E. Topallar, and M. Kemal, "An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks," Expert Systems with Applications, vol. 29, 2005, pp. 713-722.
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 713-722
-
-
Depren, M.1
Topallar, E.2
Kemal, M.3
-
9
-
-
21844433474
-
Application of online-training SVMs for real-time intrusion detection with different considerations
-
DOI 10.1016/j.comcom.2005.01.014, PII S0140366405000484
-
Z. Zhang, and H. Shen "Application of Online-Training SVMs for Real-time Intrusion detection with Different Considerations," Computer Communications, vol. 28, 2005, pp. 1428-1442. (Pubitemid 40952614)
-
(2005)
Computer Communications
, vol.28
, Issue.12
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
-
10
-
-
33746752558
-
A fast host-based intrusion detection system using rough set theory
-
S. Rawat, V. Gulati, and A. Pujari, "A fast Host-Based Intrusion Detection System Using Rough Set Theory," Transactions on Rough Sets IV, LNCS 3700, 2005, pp. 144-161.
-
(2005)
Transactions on Rough Sets IV, LNCS
, vol.3700
, pp. 144-161
-
-
Rawat, S.1
Gulati, V.2
Pujari, A.3
|