{"id":"https://openalex.org/W2051747721","doi":"https://doi.org/10.1109/hpcsim.2012.6266952","title":"Effective detection of a mobile intruder in a partially connected wireless sensor networks","display_name":"Effective detection of a mobile intruder in a partially connected wireless sensor networks","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2051747721","doi":"https://doi.org/10.1109/hpcsim.2012.6266952","mag":"2051747721"},"language":"en","primary_location":{"id":"doi:10.1109/hpcsim.2012.6266952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2012.6266952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100377647","display_name":"Yun Wang","orcid":"https://orcid.org/0000-0002-9732-9245"},"institutions":[{"id":"https://openalex.org/I24648388","display_name":"Bradley University","ror":"https://ror.org/04kmeaw70","country_code":"US","type":"education","lineage":["https://openalex.org/I24648388"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yun Wang","raw_affiliation_strings":["Department of Computer Science and Information Systems, Bradley University, Peoria, USA","Department of Computer Science & Information Systems, Bradley University, Peoria, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, Bradley University, Peoria, USA","institution_ids":["https://openalex.org/I24648388"]},{"raw_affiliation_string":"Department of Computer Science & Information Systems, Bradley University, Peoria, USA","institution_ids":["https://openalex.org/I24648388"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025598636","display_name":"Brendan M. Kelly","orcid":null},"institutions":[{"id":"https://openalex.org/I24648388","display_name":"Bradley University","ror":"https://ror.org/04kmeaw70","country_code":"US","type":"education","lineage":["https://openalex.org/I24648388"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brendan M Kelly","raw_affiliation_strings":["Department of Computer Science and Information Systems, Bradley University, Peoria, USA","Department of Computer Science & Information Systems, Bradley University, Peoria, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, Bradley University, Peoria, USA","institution_ids":["https://openalex.org/I24648388"]},{"raw_affiliation_string":"Department of Computer Science & Information Systems, Bradley University, Peoria, USA","institution_ids":["https://openalex.org/I24648388"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005001873","display_name":"Steven Dolins","orcid":null},"institutions":[{"id":"https://openalex.org/I24648388","display_name":"Bradley University","ror":"https://ror.org/04kmeaw70","country_code":"US","type":"education","lineage":["https://openalex.org/I24648388"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steven Dolins","raw_affiliation_strings":["Department of Computer Science and Information Systems, Bradley University, Peoria, USA","Department of Computer Science & Information Systems, Bradley University, Peoria, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, Bradley University, Peoria, USA","institution_ids":["https://openalex.org/I24648388"]},{"raw_affiliation_string":"Department of Computer Science & Information Systems, Bradley University, Peoria, USA","institution_ids":["https://openalex.org/I24648388"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100377647"],"corresponding_institution_ids":["https://openalex.org/I24648388"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72557871,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"14","issue":null,"first_page":"417","last_page":"423"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.8366438150405884},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.763428807258606},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7402160167694092},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.6640875339508057},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5304809212684631},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49339714646339417},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.474581241607666},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4551439881324768},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.44708117842674255},{"id":"https://openalex.org/keywords/monte-carlo-method","display_name":"Monte Carlo method","score":0.42049339413642883},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4192749857902527},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3688351809978485},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3501847982406616},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.32130005955696106},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.18427413702011108},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11840155720710754},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07555216550827026}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.8366438150405884},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.763428807258606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7402160167694092},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.6640875339508057},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5304809212684631},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49339714646339417},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.474581241607666},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4551439881324768},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.44708117842674255},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.42049339413642883},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4192749857902527},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3688351809978485},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3501847982406616},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.32130005955696106},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.18427413702011108},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11840155720710754},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07555216550827026},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcsim.2012.6266952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2012.6266952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1541256735","https://openalex.org/W1546954851","https://openalex.org/W1987877930","https://openalex.org/W1988230887","https://openalex.org/W2035075784","https://openalex.org/W2048184324","https://openalex.org/W2050740574","https://openalex.org/W2101709734","https://openalex.org/W2110670509","https://openalex.org/W2117768029","https://openalex.org/W2143667229","https://openalex.org/W2152246564","https://openalex.org/W2154730439","https://openalex.org/W2159845810","https://openalex.org/W2161978945","https://openalex.org/W2164472621","https://openalex.org/W2165410586","https://openalex.org/W6663015829"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W3009067413","https://openalex.org/W2170939602","https://openalex.org/W1729918523","https://openalex.org/W2119572658","https://openalex.org/W2538446308","https://openalex.org/W2059994477","https://openalex.org/W2140892693","https://openalex.org/W2163245470","https://openalex.org/W2149692385"],"abstract_inverted_index":{"For":[0],"a":[1,14,77],"wireless":[2],"sensor":[3],"network":[4,65],"(WSN)":[5],"to":[6,119],"operate":[7],"successfully":[8],"in":[9,59,76],"an":[10],"application":[11],"of":[12,20,61,99],"detecting":[13],"mobile":[15],"intruder,":[16],"the":[17,21,24,27,31,47,71,90,121],"sensor's":[18],"sensing":[19,62],"intruder":[22],"and":[23,30,64,85,92,96,108,115],"communication":[25,93],"between":[26],"tasking":[28],"sensor(s)":[29],"base":[32],"station":[33],"should":[34],"be":[35],"jointly":[36],"considered":[37],"for":[38,55],"effective":[39,72,100],"intrusion":[40,73,102],"detection.":[41],"Most":[42],"related":[43],"work":[44,68],"either":[45],"treats":[46],"two":[48],"tasks":[49,54],"separately":[50],"or":[51],"considers":[52],"both":[53],"general-purpose":[56],"WSN":[57,81],"applications":[58],"terms":[60],"coverage":[63],"connectivity.":[66],"This":[67],"instead":[69],"investigates":[70],"detection":[74,103],"problem":[75],"partially":[78],"connected":[79],"random":[80],"from":[82],"modeling,":[83],"analysis,":[84],"simulation":[86],"perspectives":[87],"by":[88],"integrating":[89],"K-sensing":[91,101],"tasks.":[94],"Upper":[95],"lower":[97],"bounds":[98],"probability":[104],"are":[105,113,117],"mathematically":[106],"formulated":[107],"theoretically":[109],"derived.":[110],"Monte-Carlo":[111],"Simulations":[112],"conducted":[114],"outcomes":[116],"shown":[118],"support":[120],"theoretical":[122],"analysis.":[123]},"counts_by_year":[{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
