Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
A survey on wireless body area networks: Architecture, security challenges and research opportunities
In the era of communication technologies, wireless healthcare networks enable innovative
applications to enhance the quality of patients' lives, provide useful monitoring tools for …
applications to enhance the quality of patients' lives, provide useful monitoring tools for …
ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks
Vehicular ad hoc networks (VANETs) have the potential to transform the way people travel
through the creation of a safe interoperable wireless communications network that includes …
through the creation of a safe interoperable wireless communications network that includes …
A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things
In this paper, we introduce Kalis, a self-adapting, knowledge-driven expert Intrusion
Detection System able to detect attacks in real time across a wide range of IoT systems …
Detection System able to detect attacks in real time across a wide range of IoT systems …
A survey of MANET intrusion detection & prevention approaches for network layer attacks
In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next
generation wireless networking technology. However, MANETs are vulnerable to various …
generation wireless networking technology. However, MANETs are vulnerable to various …
Security issues of mobile ad hoc and sensor networks
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …
of wireless links, the limited physical protection of nodes, the dynamically changing …
Decentralized intrusion detection in wireless sensor networks
APR Da Silva, MHT Martins, BPS Rocha… - Proceedings of the 1st …, 2005 - dl.acm.org
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many
scenarios WSNs are of interest to adversaries and they become susceptible to some types of …
scenarios WSNs are of interest to adversaries and they become susceptible to some types of …
Classifier ensembles: Select real-world applications
Broad classes of statistical classification algorithms have been developed and applied
successfully to a wide range of real-world domains. In general, ensuring that the particular …
successfully to a wide range of real-world domains. In general, ensuring that the particular …
Static analysis of executables for collaborative malware detection on android
Smartphones are getting increasingly popular and several malwares appeared targeting
these devices. General countermeasures to smartphone malwares are currently limited to …
these devices. General countermeasures to smartphone malwares are currently limited to …