Averaged dependence estimators for DoS attack detection in IoT networks
暂无分享,去创建一个
Van Nhan Vo | Tri Gia Nguyen | Surasak Sanguanpong | Chakchai So-In | Zubair Baig | Syed Naeem Firdous | Z. Baig | C. So-In | S. Sanguanpong | S. Firdous
[1] Glenn A. Fink,et al. Overview of Security and Privacy in Cyber‐Physical Systems , 2017 .
[2] Craig Valli,et al. Future challenges for smart cities: Cyber-security and digital forensics , 2017, Digit. Investig..
[3] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[4] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[5] Christian Brecher,et al. Industrial Internet of Things and Cyber Manufacturing Systems , 2017 .
[6] Sabina Jeschke,et al. Managing the Cyber Security Life‐Cycle of Smart Cities , 2017 .
[7] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[8] Liangxiao Jiang,et al. Attribute Value Weighted Average of One-Dependence Estimators , 2017, Entropy.
[9] Miroslav Popovic,et al. A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method , 2018, Comput. Electr. Eng..
[10] Jie Wu,et al. IoT Hierarchical Topology Strategy and Intelligentize Evaluation System of Diesel Engine in Complexity Environment , 2018, Sensors.
[11] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[12] Feng Lin,et al. Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory , 2019, IEEE Access.
[13] Elena Sitnikova,et al. Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..
[14] Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..
[15] Zubair A. Baig,et al. Distributed Denial of Service Attack Detection in Wireless Sensor Networks , 2008 .
[16] Fabiano Hessel,et al. Security Challenges in 5G-Based IoT Middleware Systems , 2016 .
[17] Michel Dagenais,et al. An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment , 2018, Journal of Cloud Computing.
[18] Michael J. McGrath,et al. Sensor Network Topologies and Design Considerations , 2013 .
[19] A. M. Hay,et al. The derivation of global estimates from a confusion matrix , 1988 .
[20] Kamel Mohamed Faraoun,et al. Neural Networks Learning Improvement using the K-Means Clustering Algorithm to Detect Network Intrusions , 2007 .
[21] Geoffrey I. Webb,et al. Not So Naive Bayes: Aggregating One-Dependence Estimators , 2005, Machine Learning.
[22] Geoffrey I. Webb,et al. Averaged One-Dependence Estimators , 2010, Encyclopedia of Machine Learning.
[23] Erol Gelenbe,et al. Stability of the Random Neural Network Model , 1990, Neural Computation.
[24] Giancarlo Fortino,et al. An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 , 2019, IEEE Transactions on Industrial Informatics.
[25] Ki-Il Kim,et al. A Survey on Real-Time Communications in Wireless Sensor Networks , 2017, Wirel. Commun. Mob. Comput..
[26] Tanmay De,et al. Mathematical modelling of DDoS attack and detection using correlation , 2017 .
[27] Marc Dacier,et al. A framework for attack patterns' discovery in honeynet data , 2008 .