Patient Monitoring System Using Wireless Sensor Network
Abstract
Keywords
Full Text:
PDFReferences
A. Boukerche, R.B. Machado, K.R.L. Juca, J.B.M. Sobral, and M.S.M.A. Notare, “An Agent Based and Biological Inspired Real-Time Intrusion Detection and Security Model for Computer Network Operations,” Computer Comm., vol. 30, no. 13, pp. 2649-2660, Sept. 2007.
A. Boukerche, K.R.L. Juc, J.B. Sobral, and M.S.M.A. Notare, “An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems,” Parallel Computing, vol. 30, nos. 5/6, pp. 629-646, 2004.
IEEE 802.11-1999, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher Speed Physical Layer Extension in the 2.4 GHz Band.
J.R. Quinlan, “Induction of Decision Trees,” Machine Learning, vol. 1, pp. 81-106, 1986.
J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., pp. 15-28, 2003.
A. Boukerche, Algorithms and Protocols for Wireless and Mobile AdHoc Networks. Wiley, 2008.
A. Boukerche and M.S.M.A. Notare, “Behavior-Based Intrusion Detection in Mobile Phone Systems,” J. Parallel and Distributed Computing, vol. 62, no. 9, pp. 1476-1490, 2002.
Y. Chen, Y. Li, X. Cheng, and L. Guo, “Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System,” Proc. Conf. Information Security and Cryptology (Inscrypt), 2006.
H. Liu and H. Motoda, Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic, 1998.
A.H. Sung and S. Mukkamala, “The Feature Selection and Intrusion Detection Problems,” Proc. Ninth Asian Computing Science Conf., 2004.
A.H. Sung and S. Mukkamala, “Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks,” Proc. Symp. Applications and the Internet (SAINT ’03), Jan. 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.