{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:33:14Z","timestamp":1768552394059,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":19,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369714","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"205-209","source":"Crossref","is-referenced-by-count":8,"title":["A new Anomaly Traffic Detection Based on Fuzzy Logic Approach in Wireless Sensor Networks"],"prefix":"10.1145","author":[{"given":"Van-Truong","family":"Nguyen","sequence":"first","affiliation":[{"name":"VNPT Thua Thien Hue, Hue Viet Nam"}]},{"given":"Tien-Xuyen","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Pots and Telecoms Inst of Technology, Ha Noi, Viet Nam"}]},{"given":"Trong-Minh","family":"Hoang","sequence":"additional","affiliation":[{"name":"Pots and Telecoms Inst of Technology, Ha Noi, Viet Nam"}]},{"given":"Nhu-Lan","family":"Vu","sequence":"additional","affiliation":[{"name":"Thang long University"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369714-1","unstructured":"Gavri&#263;, &#381;., Simi&#263;, D. 2018. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks. Ingenier&#237;a e Investigaci&#243;n, 38(1), 130--138."},{"key":"key-10.1145\/3368926.3369714-2","unstructured":"P. Kaur, M. Kumar, and A. Bhandari. 2017. A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering, 5(1), pp. 301--320."},{"key":"key-10.1145\/3368926.3369714-3","unstructured":"C. A Shannon. 1948. Mathematical Theory of Communication. Bell System Technical Journal, vol. 27, 379--423."},{"key":"key-10.1145\/3368926.3369714-4","unstructured":"A. G. Fragkiadakis, et. al (2015). Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wireless Communications and Mobile Computing, vol. 15, no. 2, pp. 276--294."},{"key":"key-10.1145\/3368926.3369714-5","unstructured":"M. Maksimovic. 2014. Fuzzy logic and Wireless Sensor Networks -- A survey. Journal of Intelligent and Fuzzy Systems, vol. 27, pp. 877--890, 2014."},{"key":"key-10.1145\/3368926.3369714-6","unstructured":"P. Dewal, G.S Narula, V. Jain, A. Baliyan. 2018. Security Attacks in Wireless Sensor Networks: A Survey. Cyber Security, Advances in Intelligent Systems and Computing, Springer, vol 729, 47--58."},{"key":"key-10.1145\/3368926.3369714-7","unstructured":"R. Zhang and X. Xiao. 2019. Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division. Journal of Sensors, 2019(1), 1--20."},{"key":"key-10.1145\/3368926.3369714-8","unstructured":"P. Berezi&#324;ski, M. Szpyrka, B. Jasiul, and M. Mazur. 2014. Network anomaly detection using parameterized entropy. Lecture Notes Computer Science, vol. 8838, 465--478."},{"key":"key-10.1145\/3368926.3369714-9","unstructured":"Tellenbach, B., Burkhart, M., Schatzmann, D., Gugelmann, D., Sornette. 2011. Accurate network anomaly classification with generalized entropy metrics. Computer Networks, Vol 55(15), 3485--3502."},{"key":"key-10.1145\/3368926.3369714-10","unstructured":"Z. Jian-Qi, F. Feng, Y. Ke-xin, and L. Yan-Heng. 2013. Dynamic entropy-based DoS attack detection method. Computers & Electrical Engineering, vol. 39(7), 2243--2251."},{"key":"key-10.1145\/3368926.3369714-11","unstructured":"Murat &#199;akiro&#287;nlu and Ahmet Turan &#214;zcerit. 2008. Jamming detection mechanisms for wireless sensor networks. In proceedings of the InfoScale '08, Belgium, 4--8."},{"key":"key-10.1145\/3368926.3369714-12","unstructured":"K. P. Vijayakumar, P. Ganeshkumar, M. Anandaraj, K. Selvaraj, and P. Sivakumar. 2018. Fuzzy logic--based jamming detection algorithm for cluster-based wireless sensor network. International Journal of Communication Systems, 31(10), 1--21."},{"key":"key-10.1145\/3368926.3369714-13","unstructured":"A. H. Hamamoto, L. F. Carvalho, L. D. H. Sampaio, T. Abr&#227;o, and M. L. Proen&#231;a. 2018. Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic. Expert System Application, vol. 92, 390--402."},{"key":"key-10.1145\/3368926.3369714-14","unstructured":"K. Angrishi et al. 2013. Fuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network. IEEE Network, 24(2), 943--983."},{"key":"key-10.1145\/3368926.3369714-15","unstructured":"Falsafain, S. M. Taheri, and M. Mashinchi. 2008. Fuzzy Estimation of Parameters in Statistical Models. International Journal of Computing Science and Mathematics, 2(2), 79--85."},{"key":"key-10.1145\/3368926.3369714-16","unstructured":"S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos. 2012. Real time DDoS detection using fuzzy estimators. Computer Security, 31(6), 782--790."},{"key":"key-10.1145\/3368926.3369714-17","unstructured":"C. E. Shannon. 2001. A Mathematical Theory of Communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 3--55."},{"key":"key-10.1145\/3368926.3369714-18","unstructured":"K. Doddapaneni et al. 2015. Packet Arrival Analysis in Wireless Sensor Networks. In proceedings 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, 164--169."},{"key":"key-10.1145\/3368926.3369714-19","unstructured":"Illiano, V.P.; Lupu, E.C. 2015. Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. ACM Computer Survey. Vol.48, 1--33."}],"event":{"name":"the Tenth International Symposium","location":"Hanoi, Ha Long Bay, Viet Nam","acronym":"SoICT 2019","number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"start":{"date-parts":[[2019,12,4]]},"end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369714&ftid=2101288&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:05Z","timestamp":1750204385000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369714"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369714","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}