2016
DOI: 10.17485/ijst/2016/v9i32/100196
|View full text |Cite
|
Sign up to set email alerts
|

To Enhance the Security in Wireless Nodes using Centralized and Synchronized IDS Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Analytical forms of SSV simulation vectors are shown in (10) and (11), where a primary input (e.g. NF1, SF6, LF_LIST) is described as member A where   (11) The simulation results in a side by side comparison are shown in Fig. 14. SSV logic circuit consists of 15 logical gates.…”
Section: Theoretical Simulation Resultsmentioning
confidence: 99%
“…Analytical forms of SSV simulation vectors are shown in (10) and (11), where a primary input (e.g. NF1, SF6, LF_LIST) is described as member A where   (11) The simulation results in a side by side comparison are shown in Fig. 14. SSV logic circuit consists of 15 logical gates.…”
Section: Theoretical Simulation Resultsmentioning
confidence: 99%
“…IDS provide security to detect the attack and to prevent the attacks [16]. IDS is classified as Host base, Network base and Hybrid.…”
Section: Intrusion Detection System (Ids)mentioning
confidence: 99%