2009 IEEE International Conference on Communications 2009
DOI: 10.1109/icc.2009.5198738
|View full text |Cite
|
Sign up to set email alerts
|

An Optimal Sensor Network for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Our proposed algorithm (with 2-bit quantization) is essentially optimal in the Bayesian sense. 2 In the following results the optimal values of the window size are used and are obtained through exhaustive search. The efficient way to obtain T opt is out of the scope of this paper and will be pursued in the future.…”
Section: B Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Our proposed algorithm (with 2-bit quantization) is essentially optimal in the Bayesian sense. 2 In the following results the optimal values of the window size are used and are obtained through exhaustive search. The efficient way to obtain T opt is out of the scope of this paper and will be pursued in the future.…”
Section: B Performance Evaluationmentioning
confidence: 99%
“…Sensor networks have been of great interest in recent years because of their various applications including environmental monitoring [1], battlefield surveillance [2], and system health management [3][4][5], etc. A sensor network may consist of a large number of geographically distributed sensor nodes, which enables monitoring the phenomena of interest on a potentially unprecedented scale and with high precision.…”
Section: Introductionmentioning
confidence: 99%
“…These small sensors, can work collaboratively in a distributed fashion to collect information more efficiently [1], [2], [3], [4]. Some of the diverse range of applications of sensor networks include monitoring [5], [6], intrusion detection [7] and surveillance [8]. One of the important applications of such networks is target tracking.…”
Section: Introductionmentioning
confidence: 99%
“…We focus on the scenario of one single network function that requires all the data packets of the flows to be processed before they leave the network. This is common for many network services related to security and analytics, such as Intrusion Detection Systems (IDSs) [4], [5], Intrusion Prevention Systems (IPSs) [6], Deep Packet Inspection (DPI) 1 , and network analytics/billing services. Each VNF instance is implemented at a virtual machine with limited resources and processing capacity.…”
Section: Introductionmentioning
confidence: 99%