Brain‑Like Two‑Layer Learning based Efficient Attack Detection for Wireless Sensor Networks

[1]  Kotaro Hirasawa,et al.  A Hierarchical Learning System Incorporating with Supervised, Unsupervised and Reinforcement Learning , 2007, ISNN.

[2]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[3]  Jun Wu,et al.  Integrated UCON-Based Access Control and Adaptive Intrusion Detection for Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[4]  Yin Chen,et al.  Anomaly detection in sensor networks based on large deviations of Markov chain models , 2008, 2008 47th IEEE Conference on Decision and Control.

[5]  Shigeru Shimamoto,et al.  Usage Control Based Security Access Scheme for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[6]  Hsiao-Hwa Chen,et al.  Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.

[7]  Kenji Doya,et al.  What are the computations of the cerebellum, the basal ganglia and the cerebral cortex? , 1999, Neural Networks.

[8]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[9]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[10]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[11]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[12]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[13]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.