dc.contributor.author | Stavrou, Eliana | en |
dc.contributor.author | Pitsillides, Andreas | en |
dc.creator | Stavrou, Eliana | en |
dc.creator | Pitsillides, Andreas | en |
dc.date.accessioned | 2019-11-13T10:42:23Z | |
dc.date.available | 2019-11-13T10:42:23Z | |
dc.date.issued | 2012 | |
dc.identifier.isbn | 978-1-4503-1628-6 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/55024 | |
dc.description.abstract | Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks in WSNs have been proposed in a generic security context and do not constitute a representative assessment of intrusion recovery protocols. This paper proposes an evaluation methodology to aid the evaluation and comparison of intrusion recovery protocols in WSNs. The methodology defines the intrusion recovery protocol aspects that should be evaluated using a number of evaluation criteria and guides researchers in identifying the evaluation direction they should follow. | en |
dc.source | MSWiM'12 - Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems | en |
dc.source | 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2012 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869467864&doi=10.1145%2f2387238.2387267&partnerID=40&md5=587fb9e4923f7dc1c043655f1dbc0b3d | |
dc.subject | Security | en |
dc.subject | Wireless sensor networks | en |
dc.subject | Computer system recovery | en |
dc.subject | Performance evaluation | en |
dc.subject | Evaluation criteria | en |
dc.subject | Evaluation methodologies | en |
dc.subject | WSN | en |
dc.subject | Evaluation framework | en |
dc.subject | Intrusion recovery | en |
dc.subject | Security context | en |
dc.subject | Security evaluation | en |
dc.title | Security evaluation methodology for intrusion recovery protocols in wireless sensor networks | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1145/2387238.2387267 | |
dc.description.startingpage | 167 | |
dc.description.endingpage | 170 | |
dc.author.faculty | 002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Conference Object | en |
dc.description.notes | <p>Sponsors: ACM SIGSIM | en |
dc.description.notes | Conference code: 93970 | en |
dc.description.notes | Cited By :5</p> | en |
dc.contributor.orcid | Pitsillides, Andreas [0000-0001-5072-2851] | |
dc.gnosis.orcid | 0000-0001-5072-2851 | |