Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India 2010
DOI: 10.1145/1858378.1858420
|View full text |Cite
|
Sign up to set email alerts
|

Wireless intrusion detection based on different clustering approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…To create an NIDS module for LoRa,we explored the IDS of wifi from the works of Athira [9]which proposed an clustering approach on this.The effective approach in LoRa is initially identified based on these works values.The NIDS formulated from the work paper by Danish published in 2018 IEEE conference [10].The paper clearly defines about jamming about detection using NIDS in LoRaWAN protocol.…”
Section: Related Workmentioning
confidence: 99%
“…To create an NIDS module for LoRa,we explored the IDS of wifi from the works of Athira [9]which proposed an clustering approach on this.The effective approach in LoRa is initially identified based on these works values.The NIDS formulated from the work paper by Danish published in 2018 IEEE conference [10].The paper clearly defines about jamming about detection using NIDS in LoRaWAN protocol.…”
Section: Related Workmentioning
confidence: 99%