Identifying Malicious Nodes in Wireless Sensor Networks Based on Correlation Detection
暂无分享,去创建一个
Yingxu Lai | Jing Liu | Yipeng Wang | Tong Tang | Liyao Tong | Zijian Zhao | Hua Qin | Yingxu Lai | Liyao Tong | Jing Liu | Yipeng Wang | Tong Tang | Zijian Zhao | Hua Qin | T. Tang
[1] Yan Li,et al. Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[2] D. Rawat,et al. Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks , 2022, IEEE Transactions on Network Science and Engineering.
[3] Shahram Babaie,et al. A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network , 2018, Appl. Comput. Syst..
[4] Giorgio Battistelli,et al. Distributed joint sensor registration and target tracking via sensor network , 2019, Inf. Fusion.
[5] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[6] Frank L. Lewis,et al. Robust Adaptive Fault-Tolerant Control of Multiagent Systems With Uncertain Nonidentical Dynamics and Undetectable Actuation Failures , 2015, IEEE Transactions on Industrial Electronics.
[7] A. Sarwat,et al. False Data Injection Impact Analysis In AI-Based Smart Grid , 2021, SoutheastCon 2021.
[8] Petros Spachos,et al. Real-Time Indoor Carbon Dioxide Monitoring Through Cognitive Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[9] Mahmoud Al-Ayyoub,et al. Collusion attacks mitigation in internet of things: a fog based model , 2017, Multimedia Tools and Applications.
[10] Yuanqing Xia,et al. Event-based distributed state estimation for linear systems under unknown input and false data injection attack , 2020, Signal Process..
[11] Neeta Pandey,et al. An Efficient Weighted Trust Method for Malicious Node Detection in Clustered Wireless Sensor Networks , 2018, 2018 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES).
[12] Tian Wang,et al. Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing , 2020, Comput. Commun..
[13] Lidan Wang,et al. Secure distributed estimation against false data injection attack , 2020, Inf. Sci..
[14] Niels Kjølstad Poulsen,et al. New developments in state estimation for nonlinear systems , 2000, Autom..
[15] Naixue Xiong,et al. Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.
[16] Jie Wu,et al. Collusion Attack Detection in Networked Systems , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[17] M. Venkatesulu,et al. Based on Neighbor Density Estimation Technique to Improve the Quality of Service and to Detect and Prevent the Sinkhole Attack in Wireless Sensor Network , 2019, 2019 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS).
[18] Mohammad Ubaidullah Bokhari,et al. SEPFL routing protocol based on fuzzy logic control to extend the lifetime and throughput of the wireless sensor network , 2016, Wirel. Networks.
[19] Abdelkamel Tari,et al. Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET , 2018, J. Inf. Secur. Appl..
[20] Khalid Satori,et al. Preventing Black Hole Attack in Wireless Sensor Network Using HMM , 2019, Procedia Computer Science.
[21] Henk Polinder,et al. Analysis and Neutral Voltage-Based Detection of Interturn Faults in High-Speed Permanent-Magnet Machines With Parallel Strands , 2015, IEEE Transactions on Industrial Electronics.
[22] Bubu Bhuyan,et al. Game Theoretical Defense Mechanism Against Reputation Based Sybil Attacks , 2020 .