2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE) 2013
DOI: 10.1109/iceccpce.2013.6998748
|View full text |Cite
|
Sign up to set email alerts
|

Coordinator and router investigation in IEEE802.15.14 ZigBee wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The commands of users with authorization on the system also are executed. It is pretty challenging to keep all user logs and provide them access depending on the information because users are human, but sensors, devices, and services [58,69]. The user's permission in the IoT network is referred to as identification.…”
Section: Fig 7 Pointwise Collective and Contextual Anomaly Typesmentioning
confidence: 99%
“…The commands of users with authorization on the system also are executed. It is pretty challenging to keep all user logs and provide them access depending on the information because users are human, but sensors, devices, and services [58,69]. The user's permission in the IoT network is referred to as identification.…”
Section: Fig 7 Pointwise Collective and Contextual Anomaly Typesmentioning
confidence: 99%
“…However, the single modal model cannot easily judge the consumer's emotion ] 14 , 15 [ . With cannot decide someone is emotional simply by looking at a particular entity or occurrence in front of our eyes [16,17]. This is one reason why emotional recognition should be treated as a multimodal problem [18,19].…”
Section: Introductionmentioning
confidence: 99%
“…Deep learning approaches are applied in network intrusion detection that can uncover secret patterns and identify attacks. Furthermore, the significant point in deep learning is that it can perform feature extraction and classification tasks together [17][18][19]. The intrusion has different features and behaviors.…”
Section: Introductionmentioning
confidence: 99%