[1]
|
IMRCDS: Privacy Preserving Wireless Sensor Networks For E-Healthcare Applications
|
|
International Journal …,
2024 |
|
|
[2]
|
Medical wireless sensor diagnosis and children's respiratory tract infection nursing intervention
|
|
2021 |
|
|
[3]
|
Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey
|
|
2020 |
|
|
[4]
|
Datasets for intrusion detection for wireless body area networks
|
|
2019 |
|
|
[5]
|
Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division
|
|
2019 |
|
|
[6]
|
Security Analysis of DSR and DSDV Protocol in Wireless Sensor Networks
|
|
2017 |
|
|
[7]
|
A Review: Intrusion Detection System in Wireless Sensor Networks
|
|
2017 |
|
|
[8]
|
DESIGN OF AN INTRUSION DETECTION SYSTEM TO DETECT THE BLACK HOLE ATTACK USING LESS ENERGY CONSUMPTION IN WSN
|
|
2017 |
|
|
[9]
|
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
|
|
Journal of Sensors,
2016 |
|
|
[10]
|
A Brief survey on Intrusion Detection System for WSN
|
|
International Journal of Computer Trends and Technology,
2016 |
|
|
[11]
|
An energy efficient routing protocol using RD-MAC in WSNs
|
|
2016 |
|
|
[12]
|
Research Article WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
|
|
Kasasbeh,
2016 |
|
|
[13]
|
Optimization of Economic Load Dispatch Thermal Power Plant Using Differential Evolution Technique
|
|
International Journal of Engineering Trends and Technology ,
2015 |
|
|
[14]
|
Effective Intrusion Detection System using Data Mining Technique
|
|
JETIR (ISSN-2349-5162),
2015 |
|
|
[15]
|
Processing Phase of Summarizer for Multiple News Single Punjabi Documents
|
|
International Journal of Engineering Trends and Technology,
2015 |
|
|
[16]
|
An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Networks
|
|
2015 |
|
|
[17]
|
A Survey on Medium Access Control Protocols based on Synchronous Duty Cycle Approach in Wireless Sensor Networks
|
|
IJCSNS,
2014 |
|
|
[18]
|
物联网中重复博弈论入侵检测模型
|
|
重庆大学学报,
2014 |
|
|
[19]
|
A Novel Clustering Algorithm for Homogenous and Large-Scale Wireless Sensor Networks: Based on Sensor Nodes Deployment Location
|
|
IJCSNS,
2014 |
|
|
[20]
|
An Immune Inspired Behavior-based Multi-Agent Model for Detecting Network Clients' Misbehavior
|
|
International Journal Of Engineering And Computer Science,
2014 |
|
|
[21]
|
An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients' Misbehavior
|
|
2014 |
|
|
[22]
|
Novel research of intrusion detection based on repeated game in wireless sensor network
|
|
Application Research of Computers,
2013 |
|
|
[23]
|
A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks
|
|
JV Daniel, S Joshna, P Manjula,
2013 |
|
|
[24]
|
An Introduction to Various Basic Concepts of Clustering Techniques on Wireless Sensor Networks
|
|
International Journal of Computational Engineering Research (IJCER),
2013 |
|
|
[25]
|
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
|
|
Communications Surveys & Tutorials, IEEE ,
2013 |
|
|
[26]
|
HCERHSW: A Hierarchical, Clustering-based and Energy-aware Routing Algorithm for Homogenous and Static Wireless Sensor Networks
|
|
2013 |
|
|
[27]
|
WSN 中一种新的基于重复博弈的入侵检测研究
|
|
计算机应用研究,
2013 |
|
|
[28]
|
Performance analysis for Bit-error-rate of DS-CDMA sensor network systems with source coding
|
|
2012 |
|
|
[29]
|
Intrusion Detection System in Wireless Sensor Network
|
|
International Journal of Computer Science and Communication Engineering,
2012 |
|
|
[30]
|
WEAKNESSES, VULNERABILITIES AND ELUSION STRATEGIES AGAINST INTRUSION DETECTION SYSTEMS
|
|
International Journal of Computer Science & Engineering Survey (IJCSES),
2012 |
|
|
[31]
|
Fusion Performance in Wireless DS-CDMA Sensor Networks with Analog Relay Local Processing Scheme
|
|
International Journal of Grid and Distributed Computing,
2012 |
|
|
[32]
|
Performance Analysis for Bit Error Rate of DS-CDMA Sensor Network Systems with Source Coding
|
|
TELKOMNIKA (Telecommunication Computing Electronics and Control),
2012 |
|
|