— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...