Enhanced network intrusion detection system protocol for internet of things
暂无分享,去创建一个
[1] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[2] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[3] Umamakeswari Arumugam,et al. Data driven intrusion detection system for software defined networking enabled industrial internet of things , 2018, J. Intell. Fuzzy Syst..
[4] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[5] Maode Ma,et al. Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.
[6] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[8] C. Jayakumar,et al. Unique identity and localization based replica node detection in hierarchical wireless sensor networks , 2017, Comput. Electr. Eng..
[9] V. S. Malemath,et al. Security attacks and secure routing protocols in RPL-based Internet of Things: Survey , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).
[10] Mouzhi Ge,et al. Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..
[11] Vijay Varadharajan,et al. A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.
[12] Lidong Wang,et al. Big Data Analytics for Network Intrusion Detection: A Survey , 2017 .
[13] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[14] Jemal H. Abawajy,et al. Secure Object Tracking Protocol for the Internet of Things , 2016, IEEE Internet of Things Journal.
[15] Mauro Conti,et al. Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks , 2018, Comput. Commun..
[16] Fazirulhisyam Hashim,et al. Energy trust system for detecting sybil attack in clustered wireless sensor networks , 2015, 2015 IEEE 12th Malaysia International Conference on Communications (MICC).
[17] Mouzhi Ge,et al. Self-adaptive RFID Authentication for Internet of Things , 2019, AINA.
[18] Lianbing Deng,et al. Mobile network intrusion detection for IoT system based on transfer learning algorithm , 2018, Cluster Computing.
[19] Marine Minier,et al. Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[20] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[21] Jaime Lloret,et al. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT , 2017, Sensors.
[22] S. Mercy Shalinie,et al. Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.
[23] Antonio F. Gómez-Skarmeta,et al. Enhancing IoT security through network softwarization and virtual security appliances , 2018, Int. J. Netw. Manag..
[24] Pavol Zavarsky,et al. An analysis of security weaknesses in the evolution of RFID enabled passport , 2012, World Congress on Internet Security (WorldCIS-2012).
[25] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[26] Nei Kato,et al. State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.
[27] Krishna Kant,et al. A lightweight Sybil attack detection framework for Wireless Sensor Networks , 2014, 2014 Seventh International Conference on Contemporary Computing (IC3).
[28] Carsten Maple,et al. Intrusion Detection Systems for Intra-Vehicle Networks: A Review , 2019, IEEE Access.
[29] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[30] Jianhui Wang,et al. Detection and Characterization of Intrusions to Network Parameter Data in Electric Power Systems , 2019, IEEE Transactions on Smart Grid.
[31] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[32] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[33] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[34] LeAnhtuan,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012 .
[35] Thiemo Voigt,et al. Intrusion Detection in the RPL-connected 6LoWPAN Networks , 2017, IoTPTS@AsiaCCS.
[36] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[37] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[38] Jatinder Singh,et al. TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks , 2016 .