• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4698324)   Today's Articles (7161)
For: Kagade RB, Jayagopalan S. Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation. Int J Network Mgmt 2022;32. [DOI: 10.1002/nem.2196] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/18/2021] [Accepted: 11/23/2021] [Indexed: 01/05/2025]
Number Cited by Other Article(s)
1
Karthikeyan M, Manimegalai D, RajaGopal K. Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Sci Rep 2024;14:231. [PMID: 38168562 PMCID: PMC10762054 DOI: 10.1038/s41598-023-50554-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/02/2023] [Accepted: 12/21/2023] [Indexed: 01/05/2024]  Open
2
Aljebreen M, Alohali MA, Saeed MK, Mohsen H, Al Duhayyim M, Abdelmageed AA, Drar S, Abdelbagi S. Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2023;23:4073. [PMID: 37112414 PMCID: PMC10140898 DOI: 10.3390/s23084073] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/04/2023] [Revised: 02/24/2023] [Accepted: 03/01/2023] [Indexed: 06/19/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA