Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network
暂无分享,去创建一个
Shahaboddin Shamshirband | Ajith Abraham | Nor Badrul Anuar | Ahmed Patel | Miss Laiha Mat Kiah | Babak Daghighi | N. B. Anuar | M. L. M. Kiah | A. Abraham | Shahaboddin Shamshirband | Ahmed Patel | Babak Daghighi
[1] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[2] Juan Vicente Capella,et al. In-line monitoring of chemical-analysis processes using Wireless Sensor Networks , 2012 .
[3] Jiankun Hu,et al. A mutual-healing key distribution scheme in wireless sensor networks , 2011, J. Netw. Comput. Appl..
[4] Maziar Palhang,et al. Multi-criteria expertness based cooperative Q-learning , 2012, Applied Intelligence.
[5] Joel J. P. C. Rodrigues,et al. Toward ubiquitous mobility solutions for body sensor networks on healthcare , 2012, IEEE Communications Magazine.
[6] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[7] S. Selvakumar,et al. Distributed denial of service attack detection using an ensemble of neural classifier , 2011, Comput. Commun..
[8] Kyung-Ah Shim,et al. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.
[9] Geng Yang,et al. An intelligent method for real-time detection of DDoS attack based on fuzzy logic , 2008 .
[10] Jesús Alcalá-Fdez,et al. jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation , 2012, 2012 IEEE International Conference on Fuzzy Systems.
[11] Peng Ning,et al. Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks , 2012, Ad Hoc Networks.
[12] Özgür Ulusoy,et al. A framework for use of wireless sensor networks in forest fire detection and monitoring , 2012, Comput. Environ. Urban Syst..
[13] Raquel Barco,et al. Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..
[14] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[15] Nirwan Ansari,et al. Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..
[16] Nandita Sengupta,et al. Designing of on line intrusion detection system using rough set theory and Q-learning algorithm , 2013, Neurocomputing.
[17] Levente Buttyán,et al. Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.