Review: A Survey of Intrusion Detection in Wireless Network Applications. Mitchell, R. & Chen, I. Comput. Commun., 42:1–23, April, 2014.
Paper doi bibtex @article{mitchell_review:_2014,
title = {Review: {A} {Survey} of {Intrusion} {Detection} in {Wireless} {Network} {Applications}},
volume = {42},
issn = {0140-3664},
url = {http://dx.doi.org/10.1016/j.comcom.2014.01.012},
doi = {10.1016/j.comcom.2014.01.012},
journal = {Comput. Commun.},
author = {Mitchell, Robert and Chen, Ing-Ray},
month = apr,
year = {2014},
keywords = {Classification, Intrusion detection, Security, Wireless networks},
pages = {1--23},
}
Downloads: 0
{"_id":"JzKQG29CrquNoM6DY","bibbaseid":"mitchell-chen-reviewasurveyofintrusiondetectioninwirelessnetworkapplications-2014","author_short":["Mitchell, R.","Chen, I."],"bibdata":{"bibtype":"article","type":"article","title":"Review: A Survey of Intrusion Detection in Wireless Network Applications","volume":"42","issn":"0140-3664","url":"http://dx.doi.org/10.1016/j.comcom.2014.01.012","doi":"10.1016/j.comcom.2014.01.012","journal":"Comput. Commun.","author":[{"propositions":[],"lastnames":["Mitchell"],"firstnames":["Robert"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Ing-Ray"],"suffixes":[]}],"month":"April","year":"2014","keywords":"Classification, Intrusion detection, Security, Wireless networks","pages":"1–23","bibtex":"@article{mitchell_review:_2014,\n\ttitle = {Review: {A} {Survey} of {Intrusion} {Detection} in {Wireless} {Network} {Applications}},\n\tvolume = {42},\n\tissn = {0140-3664},\n\turl = {http://dx.doi.org/10.1016/j.comcom.2014.01.012},\n\tdoi = {10.1016/j.comcom.2014.01.012},\n\tjournal = {Comput. Commun.},\n\tauthor = {Mitchell, Robert and Chen, Ing-Ray},\n\tmonth = apr,\n\tyear = {2014},\n\tkeywords = {Classification, Intrusion detection, Security, Wireless networks},\n\tpages = {1--23},\n}\n\n\n\n","author_short":["Mitchell, R.","Chen, I."],"key":"mitchell_review:_2014","id":"mitchell_review:_2014","bibbaseid":"mitchell-chen-reviewasurveyofintrusiondetectioninwirelessnetworkapplications-2014","role":"author","urls":{"Paper":"http://dx.doi.org/10.1016/j.comcom.2014.01.012"},"keyword":["Classification","Intrusion detection","Security","Wireless networks"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/hweffers","dataSources":["deqdwEwth2mY6hYZF"],"keywords":["classification","intrusion detection","security","wireless networks"],"search_terms":["review","survey","intrusion","detection","wireless","network","applications","mitchell","chen"],"title":"Review: A Survey of Intrusion Detection in Wireless Network Applications","year":2014}