作者: Rafath Samrin , D Vasumathi
DOI: 10.1109/ICEECCOT.2017.8284655
关键词:
摘要: … Intrusion discovery techniques are ordered into two strategies, namely Misuse Detection or Signature based … artificial intelligence techniques in wireless sensor networks,” International …