2012 International Conference on Computing Sciences 2012
DOI: 10.1109/iccs.2012.24
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Node in Wireless Sensor Network Based on Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…Therefore, they are internal or external attacks that have a direct impact on the network by denying users the available resources [9]. The main motivation of selecting the DoS attack is that it can be launched against any layer in the network [10] and is therefore a high priority to defend against. Yan et al proposed a novel solution to this security problem, namely; a combinatorial approach to collect data from three different resources: radar detection, traffic and neighboring data.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, they are internal or external attacks that have a direct impact on the network by denying users the available resources [9]. The main motivation of selecting the DoS attack is that it can be launched against any layer in the network [10] and is therefore a high priority to defend against. Yan et al proposed a novel solution to this security problem, namely; a combinatorial approach to collect data from three different resources: radar detection, traffic and neighboring data.…”
Section: Related Workmentioning
confidence: 99%
“…We will use the bootstrapped ID3 that is called J48, decision tree over the data to be trained. J48 extracts the best attribute from the training set that can be utilized for the partitioning of the given samples [28]. It terminates its operation when the attribute efficiently and fully classifies the training set, or else it recursively functions on the 'm' detached subsets to get the "best" attributes.…”
Section: B Decision Treementioning
confidence: 99%
“…The service models of cloud are represented as a layered architecture of cloud computing. The three most commonly used service models [28] are described in Figure 1, where resources that make the resource pool and pull the computing power for cloud computing lie in IaaS [3], the platform for providing the applications to the user is present in PaaS [4,28] and the services that are hosted at users' machines are deployed by SaaS [21,28], sometimes also called "On-demand software" [31]. The user interfaces lie on the top of these three models.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…the most objective of paper [16] is to construct an efficient detector security sightion system that is adaptation to the behavioral changes of the nodes and therefore the knowledge flowing between varied detector nodes and thence detect the malicious node in our surroundings supported its skeptical behavior.…”
Section: Related Workmentioning
confidence: 99%