Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network, is rarely accurately detectable by examining only one network layer or metric. Ideally, a synergistic approach would require knowledge from various layers to be fused and, collectively, an ultimate decision to be taken. To this aim, the Dempster-Shafer (D-S) approach is examined as a data fusion algorithm that combines beliefs of multiple metrics across multiple layers. This paper de...
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker m...
One of the main problems in open wireless networks is the inability of authenticating the identity o...
Wireless networks are becoming susceptible to increasingly more sophisticated threats. Most of the c...
The IEEE 802.11 networks are vulnerable to numerous wireless-specific attacks. Attackers can impleme...
Wireless technology has been gaining popularity over some years. Adaptation of standard depends on e...
open access articleThe broadcast nature of Wireless Local Area Networks (WLANs) has made them prone ...
YesThe broadcast nature of wireless local area networks has made them prone to several types of wir...
The Dempster-Shafer (D-S) theory provides a method to combine evidence from multiple nodes to estima...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker m...
One of the main problems in open wireless networks is the inability of authenticating the identity o...
Wireless networks are becoming susceptible to increasingly more sophisticated threats. Most of the c...
The IEEE 802.11 networks are vulnerable to numerous wireless-specific attacks. Attackers can impleme...
Wireless technology has been gaining popularity over some years. Adaptation of standard depends on e...
open access articleThe broadcast nature of Wireless Local Area Networks (WLANs) has made them prone ...
YesThe broadcast nature of wireless local area networks has made them prone to several types of wir...
The Dempster-Shafer (D-S) theory provides a method to combine evidence from multiple nodes to estima...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...