Author:
Rajasoundaran S.,Prabu A.V.,Subrahmanyam J.B.V.,Rajendran Rakesh,Sateesh Kumar G.,Kiran Siripuri,Khalaf Osamah Ibrahim
Reference44 articles.
1. Majd Latah and Levent Toker.” Towards an efficient anomaly-based intrusion detection for software-defined networks”, IET Networks , Vol: 7 , Issue: 6 , 2018 .
2. Vishwa Teja Alaparthy ; Salvatore Domenic Morgera, “A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory”, IEEE Access, Volume: 6, 2018.
3. Haiping Huang, Tianhe Gong, Rong Zhang, Lie-Liang Yang, Jiancong Zhang, and Fu Xiao, “Intrusion Detection Based on k-Coverage in Mobile Sensor Networks with Empowered Intruders”, IEEE Transactions on Vehicular Technology, vol. 67, no. 12, 2018.
4. Anush Ananthakumar, Tanmay Ganediwal, Ashwini Kunte,” Intrusion Detection System in Wireless Sensor Networks: A Review”, International Journal of Advanced Computer Science and Applications, Vol. 6, No. 12, 2015.
5. Chandrabala P. Kothari, Vaishali Kulkarni,” Intrusion Detection System using Wireless Sensor Networks: a Review”, International Journal of Engineering Research & Technology, Vol. 3 Issue12, 2014.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献