@incollection{, 07229E4D2E826BEE139D713B64878C11 , author={{MosadAlkhathami} and {AliElkateeb} and {LubnaAlazzawi} and {University of Michigan}}, journal={{Global Journal of Researches in Engineering}}, journal={{GJRE}}2249-45960975-586110.34257/gjre, address={Cambridge, United States}, publisher={Global Journals Organisation}1573543 } @book{b0, , title={{Quantitative Intrusion Intensity Assessment for Intrusion Detection Systems}} , author={{ DKim } and { SLee } and { TKim } and { JPark }} , year={2012} , publisher={Security Comm. Networks} 5 } @incollection{b1, , title={{Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments}} , author={{ SaidOmar } and { Alaaelnashar }} , journal={{EURASIP Journal on Wireless Communications and Networking}} , year={2015} } @incollection{b2, , title={{Intrusion Detection Systems}} , author={{ GLiu }} 10.4028/www.Scientific.Net/Amm.596.852 , journal={{AMM}} 596 , year={2014} } @book{b3, , title={{A Control Node for Intrusion Detection Systems Management}} , author={{ LVokorokos } and { MEnnert } and { ZDudláková } and { O&fortotira }} , year={2014} , publisher={Aei} 14 } @incollection{b4, , title={{An Appraisal and Design Of A Multi-Agent System Based Cooperative Wireless Intrusion Detection Computational Intelligence Technique}} , author={{ SShamshirband } and { NAnuar } and { MKiah } and { APatel }} , journal={{Engineering Applications Of Artificial Intelligence}} 26 9 , year={2013} } @incollection{b5, , title={{A3acks: Adaptive Three Acknowledg ments Intrusion Detection System For Manets}} , author={{ TSheltami } and { ABasabaa } and { E&shakshuki }} , journal={{J Ambient Intell Human Comput}} 5 4 , year={2014} } @incollection{b6, , title={{Wireless sensor networks for human intruder detection}} , journal={{Journal of the Indian Institute of Science}} 90 3 , year={2010} } @book{b7, , title={{Intrusion Detection System Using Wireless Sensor Networks'. EJSE Special Issue: Wireless Sensor Networks and Practical Applications}} , author={{ GhalibAAbsar-Ul-Hasan } and { AtherShah } and { Ali }} , year={2010. Sept. 2015} } @incollection{b8, , title={{Border Security Control via Distributed WSN Technolog}} , author={{ MosadHalkhathami } and { LubnaAlazzawi }} , journal={{International Journal of Scientific & Engineering Research}} 6 3 , year={March-2015} } @book{b9, , title={{Formalized Probability Theory and Applications Using Theorem Proving}} , author={{ OsmanHasan } and { Sofie?etahar }} , year={2015} , note={Internet resource} } @incollection{b10, , title={{Intrusion Detection Systems and Intrusion Prevention Systems}} , author={{ AFuchsberger }} , journal={{Information Security Technical Report}} 10 3 , year={2005} } @incollection{b11, , title={{Detection in sensor networks: The saddlepoint approximation}} , author={{ SaeedAldosari } and { José } and { Moura }} , journal={{IEEE Transactions on}} 55 , year={2007} , note={Signal Processing} } @book{b12, , title={{Architecture And Performance Evaluation Of A Hybrid Intrusion Detection System For IP Telephony}} , author={{ BBarry } and { HChan }} , year={2010} , publisher={Security Comm. Networks} 6 } @incollection{b13, , title={{Wireless Intrusion Detection System}} , author={{ SBoob } and { P&jadhav }} , journal={{International Journal of Computer Applications}} 5 8 , year={2010} } @book{b14, , title={{Applications of Computational Intelligence in Biology: Current Trends and Open Problems}} , author={{ TomaszGSmolinski } and { GMariofanna } and { AboulEMilanova } and { Hassanien }} , year={2008} , publisher={Springer} , address={Berlin} , note={Print} } @incollection{b15, , title={{Intrusion Detection System Based On Ant Colony System}} , author={{ CCai } and { LYuan }} , journal={{Journal of Networks}} 8 4 , year={2013} } @book{b16, , title={{Application Of Machine Learning Approaches In Intrusion Detection System: A Survey}} , author={{ NFarah } and { MAvishek } and { FMuhammad } and { ARahman } and { MRafni } and { DMd }} , year={2015} 4 } @incollection{b17, , title={{Clone Detection Using Enhanced EDD (EEDD) with Danger Theory in Mobile Wireless Sensor Network}} , author={{ LSSindhuja } and { GPadmavath }} , journal={{International Journal of Security & Its Applications}} , year={2015} } @incollection{b18, , title={{Border Surveillance And Intrusion Detection Using Wireless Sensor Networks}} , author={{ MosadAlkhathami } and { LubnaAlazzawi } and { AliElkateeb }} , journal={{IJAET}} 8 2 , year={Apr 2015} } @incollection{b19, , title={{Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks}} , author={{ BSun } and { LOsborne } and { YXiao } and { SGuizani }} , journal={{IEEE Wireless Comm. Magazine}} 14 5 , year={Oct 2007} } @incollection{b20, , title={{An Intelligent Distributed Intrusion Detection System Using Genetic Algorithm}} , author={{ SJanakiraman }} , journal={{JCIT}} , year={2009} } @book{b21, , title={{A Comparative Study On Shape Retrieval Using Fourier Descriptors With Different Shape Signatures}} , author={{ DengshengZhang } and { GuojunLu }} , year={2009} , note={n. page. Web} } @incollection{b22, , title={{Intrusion Prevention/Intrusion Detection System (IPS/IDS) For Wifi Networks}} , author={{ MKorcak } and { JLamer } and { F&jakab }} , journal={{IJCNC}} 6 4 , year={2014} } @incollection{b23, , title={{Omnidirectional Human Intrusion Detection System Using Computer Vision Techniques}} , author={{ WaiWong } and { ChuKiongKit } and { WaySoongLoo } and { Lim }} , booktitle={{Effective Surveillance for Homeland Security: Balancing Technology and Social Issues}} , year={2013} 411 }