Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Last revisionBoth sides next revision
public:papers:icnsc2016 [2016-09-29 11:11] – created lnemecpublic:papers:icnsc2016 [2016-11-22 13:31] – [What is this paper about?] xstehl2
Line 3: Line 3:
  
 **Abstract:** **Abstract:**
-FIXME+A number of intrusion detection techniques have been proposed to detect different kinds of active attacks on wireless sensor networks (WSNs). Selective forwarding and delay attacks are two simple but effective attacks that can disrupt the communication in WSNs. We propose two parametrized collaborative intrusion detection techniques and optimize their parameters for given scenarios using extensive simulations and multiobjective evolutionary algorithms. Moreover, we sample the whole search space to enable evaluation of evolution performance. We evaluate the influence of changes of the number of malicious nodes on the intrusion detection performance.
  
  
Line 10: Line 10:
  
 **Bibtex:** **Bibtex:**
-FIXME+ 
 +   @INPROCEEDINGS{icnsc2016, 
 +     author={M. Stehlik and V. Matyas and A. Stetsko}, 
 +     booktitle={2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC)}, 
 +     title={Towards better selective forwarding and delay attacks detection in wireless sensor networks}, 
 +     year={2016}, 
 +     pages={1-6}, 
 +     keywords={evolutionary computation;security of data;wireless sensor networks;WSN;delay attacks detection;intrusion detection techniques;multiobjective evolutionary algorithms;search space;selective forwarding;wireless sensor networks;Collaboration;Delays;Evolutionary computation;Intrusion detection;Monitoring;Optimization;Wireless sensor networks}, 
 +     doi={10.1109/ICNSC.2016.7478978}, 
 +     month={April}, 
 +   } 
  
  
  
  
-===== What is this paper about? ===== 
-FIXME