2021
DOI: 10.1007/s11277-021-08288-4
|View full text |Cite
|
Sign up to set email alerts
|

An Environmental Intrusion Detection Technology Based on WiFi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Zhu et al studied the problem of maximizing the computing rate of binary computing with wireless power supply. This paper analyzes the energy delay dynamic shunting balance of mobile edge computing technology with energy collection devices and proposes an incentive compatible auction mechanism for resource transactions between mobile devices and cloud base stations to stimulate binary computing shunting [9]. Wen-He et al proposed a strategic computing diversion algorithm based on the deep Q network, which is used to learn the optimal binary computing diversion strategy in a superdense network [10].…”
Section: Related Workmentioning
confidence: 99%
“…Zhu et al studied the problem of maximizing the computing rate of binary computing with wireless power supply. This paper analyzes the energy delay dynamic shunting balance of mobile edge computing technology with energy collection devices and proposes an incentive compatible auction mechanism for resource transactions between mobile devices and cloud base stations to stimulate binary computing shunting [9]. Wen-He et al proposed a strategic computing diversion algorithm based on the deep Q network, which is used to learn the optimal binary computing diversion strategy in a superdense network [10].…”
Section: Related Workmentioning
confidence: 99%
“…This starts with a timestamp of when the transaction occurs and is recorded to the server by taking a hash along with other associated items such as IP address etc. This information is encrypted so the actual person making the transaction will not be at risk with having their personal information exposed [11]. This shows that the data has to have existed in order for the hash to have been created.…”
Section: Theory Of Algorithm/ Methodologymentioning
confidence: 99%
“…As a result, a matrix may be used to represent the STBO population, and a vector may be used to characterize each STBO individual. The STBO population is determined in a matrix as per Equation (12).…”
Section: Stbo Mathematical Modelmentioning
confidence: 99%
“…Three categories of detection methods have been established: hybrid-based detection, anomaly-based detection, and signature-based detection. 12 The anomaly detection computes the current network traffic status using the benchmark of typical traffic behavior as a main basis. If it deviates from the accepted standard, the network administrator is notified that an attack has occurred.…”
mentioning
confidence: 99%