2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7997192
|View full text |Cite
|
Sign up to set email alerts
|

A security metric for the evaluation of collaborative intrusion detection systems in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The authors examined the changes in the measurement scale and the formulation of criteria. In [50] the authors proposed the evaluation metrics to measure the effectiveness of collaborative decisions based on the likelihood of trust in collaborative decision-making processes. In [51] the author proposes a prioritization of alerts, which can be achieved by integrating several methods.…”
Section: Resultsmentioning
confidence: 99%
“…The authors examined the changes in the measurement scale and the formulation of criteria. In [50] the authors proposed the evaluation metrics to measure the effectiveness of collaborative decisions based on the likelihood of trust in collaborative decision-making processes. In [51] the author proposes a prioritization of alerts, which can be achieved by integrating several methods.…”
Section: Resultsmentioning
confidence: 99%
“…As new preparations are developed to prevent or alleviate attacks, attackers are continually evolving new methods to circumvent these new procedures, designate various attack mechanisms, categories, the scope of attacks and their existing countermeasures [12]. Distributed Denial of Service Detection Approaches streams that know how to be second-hand to become conscious of the attacks near the source [13]. To balance this transaction, their dissertation, try to detect the attack in the transitional network.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation showed that their approach could quickly identify malicious nodes in real scenarios. For some other related works, we refer to [12][13][14][15][16][17][18].…”
Section: Trust-aware Mechanismmentioning
confidence: 99%