Andriy Stetsko

According to our database1, Andriy Stetsko authored at least 10 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Towards better selective forwarding and delay attacks detection in wireless sensor networks.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

2014
Improving Intrusion Detection Systems for Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

2012
On the credibility of wireless sensor network simulations: evaluation of intrusion detection system.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

2011
Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Attack Detection vs. Privacy - How to Find the Link or How to Hide It?
Proceedings of the Security Protocols XIX, 2011

Calibrating and Comparing Simulators for Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2009
One size does not fit all - how to approach intrusion detection in wireless sensor networks.
Proceedings of the Annual Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, 2009

2008
Generating Random Numbers in Hostile Environments.
Proceedings of the Security Protocols XVI, 2008

Location Privacy Issues in Wireless Sensor Networks.
Proceedings of the Future of Identity in the Information Society, 2008


  Loading...