ARCHIVES

Research Article

Wireless Connectivity Constraints for Security Systems for Intrusion Detection

Anjum Fathima1 Arif Ali Khan2 Nayana Manohari3
123 Asst. Prof, Dept. Of Computer Science Engineering, P.D. A. College Of Engineering, Karnataka, India.

Published Online: May-August 2023

Pages: 20-23

Cite this article

No DOI

References

1 Djenouri D., Khelladi L., and Badache N., “A Survey of SecurityIssuesinMobileAd-
hocandSensorNetworks,”ComputerJournalofIEEECommunications Surveys andTutorials,vol.7,no.4,pp. 1-15,2005.
2 E.Mosqueira-Rey,A.Alonso-Betanzos,B. delRío,and.Piñeiro," AMisuseDetection Agent for Intrusion Detection in a Multi-agent Architecture," in Agent andMulti-Agent Systems:
Technologies and Applications,2007,pp.466-475.
3 E. H. Spafford and D. Zamboni, "Intrusion detectionusingautonomousagents,"ComputerNetworks,vol.34,pp. 547-570,2000.
4 F.Bellifemine,G.Caire,andD.Greenwood,Developing Multi-Agent Systems with JADE: Wiley,2007.
5 F. Gong, "Next Generation Intrusion Detection Systems(IDS),"McAfeeInc, November2003,p.14.
6 H. Yi and P. Brajendra, "A data mining approach fordatabaseintrusiondetection,"inProceedingsofthe2004 ACM symposium on Applied
computing Nicosia,Cyprus:ACM,2004.
7 J.S.Balasubramaniyan,J.O.Garcia-Fernandez,D.Isacoff, E. Spafford, and D. Zamboni, "An
architectureforintrusiondetectionusingautonomousagents,"inProceedingsofthe14thAnnualComputerSecurityApplicationsConference,
1998, pp.13-24.

Related Articles

2023

Model Aphid Predator Neuroptera (Insecta): Web-Based Digital Key Development from Dichotomous Key by Computer Programming

2023

Distributed computing and Large Information Investigation

2023

Relative Investigation: Wi-Fi Security Conventions

2023

Near Investigation of Characterization Calculations for Web Spam Recognition

2023

Heart Disease Prediction with Novel Machine Learning Technique

2023

Implementing KLM Algorithm and Open CV for Real Time Hand movement Tracking

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/wireless-connectivity-constraints-for-security-systems-for-intrusion-detection

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.