Skip to main content
The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the... more
    • by 
    •   9  
      Analytical ChemistryInformation SecurityMachine LearningComputer Security
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these... more
    • by 
    •   6  
      Decision MakingTrust and Reputation SystemsSelf Organized MapReputation System
The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this... more
    • by 
    •   5  
      Artificial IntelligenceOutlier detectionSelf Organized MapReputation System
With the expansion of Internet and its importance, the types and number of the attacks have also grown making intrusion detection an increasingly important technique. In this work we have realized a misuse detection system based on... more
    • by 
    •   4  
      Distributed ComputingAnalytic Network ProcessMisuse DetectionElectrical and Electronic Engineering
Wireless sensor networks are usually deployed in unattended environments. This is the main reason why the update of security policies upon identifying new attacks cannot be done in a timely fashion, which gives enough time to attackers to... more
    • by 
    •   9  
      AlgorithmsAnalytical ChemistryMachine LearningComputer Security
This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide... more
    • by 
    •   2  
      Machine LearningHybrid Artificial Intelligence Systems
This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide... more
    • by 
    •   2  
      Machine LearningHybrid Artificial Intelligence Systems
In order to aid in the process of detecting incorrect program behaviors, a number of approaches have been proposed which include a combination of language-level constructs (such as procedure-level assertions/contracts, program-point... more
    • by 
    •   7  
      Formal Methods (Formal Verification)Abstract InterpretationLogic ProgrammingProgram Analysis
Instrumenting programs for performing runtime checking of properties, such as regular shapes, is a common and useful technique that helps programmers detect incorrect program behaviours. This is specially true in dynamic languages such... more
    • by  and +2
    •   5  
      Logic ProgrammingProgram AnalysisSoftware Verification and ValidationResource Analysis