"Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology"
written by Emad Felemban,
published by International Journal of Communications, Network and System Sciences, Vol.6 No.5, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Application of Wireless Sensor Network and RFID Monitoring System in Airport Logistics
2018
[2] Distributed Network Structure Estimation Using Consensus Methods
2018
[3] Intrusion detection for submerged datacenters
Patent, 2018
[4] A review of data collection approaches in linear wireless sensor networks (LWSNs)
Journal of Physics: Conference Series, 2018
[5] Smart Border Monitoring System-A Survey
2018
[6] Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks
2018
[7] Application of Wireless Sensor Network and RFID Monitoring System in Airport Logistics.
2018
[8] Surveillance-Aware Uplink Scheduling for Cellular Networks
2018
[9] LBRP: A Resilient Energy Harvesting Noise Aware Routing Protocol for Under Water Sensor Networks (UWSNS)
2018
[10] Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks
2018
[11] A novel modular wireless sensor networks approach for security applications.
2017
[12] STRADAR-rozproszony system dyspozytorski i teleinformatyczny dla Straży Granicznej
Przegl?d Telekomunikacyjny + Wiadomo?ci Telekomunikacyjne, 2017
[13] Безпровідні сенсорні мережі для захисту периметру
2017
[14] IoT-Based Maritime Application: An Experiment of Ship Radius Detection
BDIOT2017 Proceedings of the International Conference on Big Data and Internet of Thing, 2017
[15] Modeling of IoT-based border protection system
2017
[16] Acoustic Propagation Modeling Based on Underwater Wireless Sensor Communication-Research Challenges
International Journal of Electrical Electronics & Computer Science Engineering, 2017
[17] Big Data Model Simulation on a Graph Database for Surveillance in Wireless Multimedia Sensor Networks
2017
[18] A comprehensive survey on multichannel routing in wireless sensor networks
Journal of Network and Computer Applications, 2017
[19] On the Power and Limitations of Deception in Multi-Robot Adversarial Patrolling
2017
[20] Ship location detection using wireless sensor networks with cooperative nodes
2017
[21] DDDAMS-Based Border Surveillance and Crowd Control via Aerostats, UAVs, and Ground Sensors
2017
[22] Datacenter immersed in cooling liquid
Patent, 2017
[23] The Use of Unmanned Aerial Vehicles in Public Safety Communication and Optimization of Coverage (Case Study-Cook Islands)
2017
[24] The central server of the Border Guard's distributed multimedia system for monitoring and visualisation of ongoing and archival events
Polymer-Plastics Technology and Engineering, 2017
[25] Wireless Sensor Network–A Study
2017
[26] Bi-objective evolutionary approach to the design of patrolling schemes for improved border security
Computers & Industrial Engineering, 2017
[27] A novel modular wireless sensor networks approach for security applications
International Journal of Security and Networks, 2017
[28] WSN application for crop protection to divert animal intrusions in the agricultural land
Computers and Electronics in Agriculture, 2017
[29] Large scale border security systems modeling and simulation with OPNET
2017
[30] Dust Motes for Border Surveillance
2017
[31] Transition from Observation to Knowledge to Intelligence
2016
[32] Detection of Failed Boundary Nodes in Wireless Sensor Networks
2016
[33] Security techniques for sensor systems and the Internet of Things
ProQuest Dissertations Publishing, 2016
[34] A Brief survey on Intrusion Detection System for WSN
2016
[35] Design and Implementation of Fuzzy Event-detection Algorithm for Border Monitoring on FPGA.
International Journal of Fuzzy Systems, 2016
[36] A Graph-Based Big Data Model for Wireless Multimedia Sensor Networks
Advances in Big Data, 2016
[37] Ship speed detection using Wireless Sensor Networks with three nodes
2016
[38] A Modified Virtual Approach to Deploy Border Line Sensors
2016
[39] Comparing AODV and DSR Routing Protocols for Connectivity Restoration in Wireless Sensor Networks
International Journal of Computer Science and Information Security, 2016
[40] Boundary node failure detection in wireless sensor networks
2016
[41] A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Sensor Networks
International Journal of Advanced Networking and Applications, 2016
[42] Computer Vision Based Object Detection and Tracking in Micro Aerial Vehicles
2016
[43] Detecting Intrusion in Large Farm Lands and Plantations in Nigeria Using Virtual Fences
2016
[44] A System for Response and Prevention of Security Incidents in Wireless Sensor Networks
ACM Transactions on Sensor Networks (TOSN), 2016
[45] A Comparative Analysis of Protocols for Integrating IP and Wireless Sensor Networks
2016
[46] Utilization Of A Large-Scale Wireless Sensor Network For Intrusion Detection And Border Surveillance
2016
[47] CERIAS Tech Report 2016-10 Security Techniques for Sensor Systems and the Internet of Things
2016
[48] IOT Based Grid Eye Thermal Mapping Gun Security System for Defence Applications
2016
[49] Critical Infrastructure Surveillance Using Secure Wireless Sensor Networks
2015
[50] Overview of event detection and surveillance approaches in heterogeneous WSNs
2015
[51] QoS aware geographic routing protocol for multimedia transmission in wireless sensor network
2015
[52] A Dynamic Approach to Sensor Network Deployment for Target Detection in Unstructured, Expanding Search Areas
2015
[53] A Survey on Current Underwater Acoustic Sensor Network Applications
M Murad, AA Sheikh, MA Manzoor, E Felemban… - ijcte.org, 2015
[54] Underwater Sensor Network Applications: A Comprehensive Survey
International Journal of Distributed Sensor Networks, 2015
[55] BORDER SURVEILLANCE AND INTRUSION DETECTION USING WIRELESS SENSOR NETWORKS
International Journal of Advances in Engineering & Technology, 2015
[56] Energy Efficient Approach for Surveillance Applications Based on Self Organized Wireless Sensor Networks
Procedia Computer Science, 2015
[57] Design and Implementation of Fuzzy Event-detection Algorithm for Border Monitoring on FPGA
International Journal of Fuzzy Systems, 2015
[58] Critical Infrastructure Surveillance Using SecureWireless Sensor Networks
Journal of Sensor and Actuator Networks, 2015
[59] Energy harvesting based protection of border surveillance systems
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
[60] MULTI-CRITERIA DECISION-MAKING FRAMEWORK FOR SURVEILLANCE AND LOGISTICS APPLICATIONS
2015
[61] Implementation of Wireless Sensor Networks in the Field of Military and Defense: A Review
2015
[62] Maximizing transported data before partition in a wireless sensor network.
COMSNETS, 2014
[63] ENERGY EFFICIENT TRACKING SYSTEM USING
T Kumaresan, S Mathias, D Khanvilkar, S Dange, 2014
[64] Performance Study of Virtual Fence Unit Using Wireless Sensor Network
HT Chan, TA Rahman, A Arsad - www-ist.massey.ac.nz, 2014
[65] A Voronoi-Based Sensor Handover Protocol for Target Tracking in Distributed Visual Sensor Networks
International Journal of Distributed Sensor …, 2014
[66] Interference-Free k-barrier Coverage in Wireless Sensor Networks
Combinatorial Optimization and Applications, 2014
[67] Maximizing transported data before partition in a wireless sensor network
2014
[68] Performance study of virtual fence unit using Wireless Sensor Network in IoT environment
2014
[69] Unsupervised Robot System using Computational Geometry and Neural Network
M Poulos - europment.org, 2014
[70] Energy Efficient Tracking System using wireless sensors
T Kumaresan, S Mathias, D Khanvilkar, S Dange, 2014
[71] PERFORMANCE STUDY OF VIRTUAL FENCING USING WIRELESS SENSING NETWORK
Thesis, 2014
[72] Imperfection Better Than Perfection: Beyond Optimal Lifetime Barrier Coverage in Wireless Sensor Networks
2013