ARCHIVES
Research Article
Wireless Connectivity Constraints for Security Systems for Intrusion Detection
Anjum Fathima1
Arif Ali Khan2
Nayana Manohari3
123 Asst. Prof, Dept. Of Computer Science Engineering, P.D. A. College Of Engineering, Karnataka, India.
Published Online: May-August 2023
Pages: 20-23
Cite this article
No DOIReferences
1 Djenouri D., Khelladi L., and Badache N., “A Survey of SecurityIssuesinMobileAd-
hocandSensorNetworks,”ComputerJournalofIEEECommunications Surveys andTutorials,vol.7,no.4,pp. 1-15,2005.
2 E.Mosqueira-Rey,A.Alonso-Betanzos,B. delRío,and.Piñeiro," AMisuseDetection Agent for Intrusion Detection in a Multi-agent Architecture," in Agent andMulti-Agent Systems:
Technologies and Applications,2007,pp.466-475.
3 E. H. Spafford and D. Zamboni, "Intrusion detectionusingautonomousagents,"ComputerNetworks,vol.34,pp. 547-570,2000.
4 F.Bellifemine,G.Caire,andD.Greenwood,Developing Multi-Agent Systems with JADE: Wiley,2007.
5 F. Gong, "Next Generation Intrusion Detection Systems(IDS),"McAfeeInc, November2003,p.14.
6 H. Yi and P. Brajendra, "A data mining approach fordatabaseintrusiondetection,"inProceedingsofthe2004 ACM symposium on Applied
computing Nicosia,Cyprus:ACM,2004.
7 J.S.Balasubramaniyan,J.O.Garcia-Fernandez,D.Isacoff, E. Spafford, and D. Zamboni, "An
architectureforintrusiondetectionusingautonomousagents,"inProceedingsofthe14thAnnualComputerSecurityApplicationsConference,
1998, pp.13-24.
hocandSensorNetworks,”ComputerJournalofIEEECommunications Surveys andTutorials,vol.7,no.4,pp. 1-15,2005.
2 E.Mosqueira-Rey,A.Alonso-Betanzos,B. delRío,and.Piñeiro," AMisuseDetection Agent for Intrusion Detection in a Multi-agent Architecture," in Agent andMulti-Agent Systems:
Technologies and Applications,2007,pp.466-475.
3 E. H. Spafford and D. Zamboni, "Intrusion detectionusingautonomousagents,"ComputerNetworks,vol.34,pp. 547-570,2000.
4 F.Bellifemine,G.Caire,andD.Greenwood,Developing Multi-Agent Systems with JADE: Wiley,2007.
5 F. Gong, "Next Generation Intrusion Detection Systems(IDS),"McAfeeInc, November2003,p.14.
6 H. Yi and P. Brajendra, "A data mining approach fordatabaseintrusiondetection,"inProceedingsofthe2004 ACM symposium on Applied
computing Nicosia,Cyprus:ACM,2004.
7 J.S.Balasubramaniyan,J.O.Garcia-Fernandez,D.Isacoff, E. Spafford, and D. Zamboni, "An
architectureforintrusiondetectionusingautonomousagents,"inProceedingsofthe14thAnnualComputerSecurityApplicationsConference,
1998, pp.13-24.
Related Articles
2023
Model Aphid Predator Neuroptera (Insecta): Web-Based Digital Key Development from Dichotomous Key by Computer Programming
2023
Distributed computing and Large Information Investigation
2023
Relative Investigation: Wi-Fi Security Conventions
2023
Near Investigation of Characterization Calculations for Web Spam Recognition
2023
Heart Disease Prediction with Novel Machine Learning Technique
2023