Differences
This shows you the differences between two versions of the page.
Next revision | Previous revisionLast revisionBoth sides next revision | ||
public:papers:icnsc2016 [2016-09-29 11:11] – created lnemec | public:papers:icnsc2016 [2016-11-22 13:31] – [What is this paper about?] xstehl2 | ||
---|---|---|---|
Line 3: | Line 3: | ||
**Abstract: | **Abstract: | ||
- | FIXME | + | A number of intrusion detection techniques have been proposed to detect different kinds of active attacks on wireless sensor networks (WSNs). Selective forwarding and delay attacks are two simple but effective attacks that can disrupt the communication in WSNs. We propose two parametrized collaborative intrusion detection techniques and optimize their parameters for given scenarios using extensive simulations and multiobjective evolutionary algorithms. Moreover, we sample the whole search space to enable evaluation of evolution performance. We evaluate the influence of changes of the number of malicious nodes on the intrusion detection performance. |
Line 10: | Line 10: | ||
**Bibtex:** | **Bibtex:** | ||
- | FIXME | + | |
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | } | ||
- | ===== What is this paper about? ===== | ||
- | FIXME | ||