Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps
暂无分享,去创建一个
José Manuel Moya | Juan-Mariano de Goyeneche | David Fraga | Álvaro Araujo | Zorana Bankovic | Juan Carlos Vallejo | J. C. Vallejo | Z. Bankovic | Á. Araujo | D. Fraga | Jose M. Moya
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Zorana Bankovic,et al. Anomaly detection in wireless sensor networks using reconfigurable SORU processor and self organizing maps , 2009 .
[3] Hujun Yin,et al. On multidimensional scaling and the embedding of self-organising maps , 2008, Neural Networks.
[4] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[5] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[6] Youngsong Mun,et al. Secure Routing in Sensor Networks: Security Problem Analysis and Countermeasures , 2005, ICCSA.
[7] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[8] T. Heskes. Energy functions for self-organizing maps , 1999 .
[9] Mark H. Overmars,et al. A Self-Organizing Neural Network for Robot Motion Planning , 1993 .
[10] Konrad Rieck,et al. Linear-Time Computation of Similarity Measures for Sequential Data , 2008, J. Mach. Learn. Res..
[11] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[12] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[13] D. Signorini,et al. Neural networks , 1995, The Lancet.
[14] Colin Fyfe,et al. The kernel self-organising map , 2000, KES'2000. Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies. Proceedings (Cat. No.00TH8516).
[15] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[16] Hojjat Adeli,et al. Improved spiking neural networks for EEG classification and epilepsy and seizure detection , 2007, Integr. Comput. Aided Eng..
[17] François-Xavier Standaert,et al. Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.
[18] Srdjan Capkun,et al. Secure time synchronization service for sensor networks , 2005, WiSe '05.
[19] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[20] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[21] A. Davies,et al. Immune Systems , 1970, Nature.
[22] Manuel Graña,et al. Morphological neural networks and vision based simultaneous localization and mapping , 2007, Integr. Comput. Aided Eng..
[23] Ashraf Saad,et al. Hybrid intelligent systems for network security , 2006, ACM-SE 44.
[24] Azzedine Boukerche,et al. Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427] , 2007, Comput. Commun..
[25] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[26] Shichao Zhang,et al. Rule-based dependency models for security protocol analysis , 2008, Integr. Comput. Aided Eng..
[27] Pedro Malagón,et al. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps , 2009, Sensors.
[28] Peter J. Bentley,et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.
[29] M. Aupetit,et al. Function Approximation with Continuous Self-Organizing Maps using . . , 2000 .
[30] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[31] Alberto Muñoz,et al. Self-organizing maps for outlier detection , 1998, Neurocomputing.
[32] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[33] Tassos Dimitriou,et al. LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.
[34] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[35] Helge J. Ritter,et al. Neural recognition of human pointing gestures in real images , 1996, Neural Processing Letters.