2008 3rd International Conference on Innovative Computing Information and Control 2008
DOI: 10.1109/icicic.2008.321
|View full text |Cite
|
Sign up to set email alerts
|

Inside Attacker Detection in Hierarchical Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…The normal profile is produced by a training procedure. All data mining and computational intelligence-based and graph-based detection schemes are prior-knowledge free (Rajasegarar et al, 2006(Rajasegarar et al, , 2007Masud et al, 2009;Wang et al, 2009;Rahul et al, 2009;Yu and Tsai, 2008;Ngai et al, 2006Ngai et al, , 2007, as well as the most of statistical detection schemes (Zhang et al, 2008;Onat and Miri, 2005a,b;Li et al, 2008b). Classification is a typical detection technique derived from the family of data mining, in which the classifier is built upon the training procedure.…”
Section: Detection Methodsmentioning
confidence: 97%
See 3 more Smart Citations
“…The normal profile is produced by a training procedure. All data mining and computational intelligence-based and graph-based detection schemes are prior-knowledge free (Rajasegarar et al, 2006(Rajasegarar et al, , 2007Masud et al, 2009;Wang et al, 2009;Rahul et al, 2009;Yu and Tsai, 2008;Ngai et al, 2006Ngai et al, , 2007, as well as the most of statistical detection schemes (Zhang et al, 2008;Onat and Miri, 2005a,b;Li et al, 2008b). Classification is a typical detection technique derived from the family of data mining, in which the classifier is built upon the training procedure.…”
Section: Detection Methodsmentioning
confidence: 97%
“…mean, variance, self-defined, etc.) (Zhang et al, 2008;Pires et al, 2004;Onat and Miri, 2005a,b;Li et al, 2008b), and statistical model (e.g. auto regression) (Curiac et al, 2007).…”
Section: State-of-the-art Techniquesmentioning
confidence: 97%
See 2 more Smart Citations
“…Xu et al [6] proposed the Dual Prediction Reporting (DPR) mechanism, in which the sensor nodes make intelligent decisions about whether or not to send updates of objects movement states to the base station and thus save energy. Yang et al [7] proposed an architecture which is able to track targets with random movement patterns with accuracy over a wide range of target speed. Arora et al [8] developed an experimental wireless sensor network for distributed intrusion detection but it is not autonomic.…”
Section: Related Workmentioning
confidence: 99%