scispace - formally typeset
X

Xia Wang

Researcher at Iowa State University

Publications -  7
Citations -  179

Xia Wang is an academic researcher from Iowa State University. The author has contributed to research in topics: Wireless mesh network & Intrusion detection system. The author has an hindex of 6, co-authored 7 publications receiving 175 citations.

Papers
More filters
Journal ArticleDOI

Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems

TL;DR: In this paper, the integration of Software Fault Tree (SFT) which describes intrusions and Coloured Petri Nets (CPNs) that specifies design is examined for an Intrusion Detection System (IDS).
Proceedings ArticleDOI

Cross-Layer Based Anomaly Detection in Wireless Mesh Networks

TL;DR: A cross-layer based anomaly intrusion detection system (IDS) to accommodate the integrated property of routing protocols with link information in wireless mesh networks (WMNs) is proposed and an IDS software prototype over a wireless mesh network testbed is implemented and evaluated.

Feature Selection in Intrusion Detection System over Mobile Ad-hoc Network

TL;DR: This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitoring intrusion detection method, which shows that the features collected by each node are too many for wireless devices with limited capacity.
Proceedings ArticleDOI

Specification Synthesis for Monitoring and Analysis of MANET Protocols

TL;DR: This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic, similar to inductive logic programming technique that derives a sound hypothesis from the individual examples.
Proceedings ArticleDOI

A heterogeneity-aware framework for group key management in wireless mesh networks

TL;DR: The results showed that HAGK reduces rekeying delay and storage overhead at end nodes with minimum communication costs and is resilient to attacks.