NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks
暂无分享,去创建一个
[1] Gregorio Martínez Pérez,et al. Providing trust in wireless sensor networks using a bio-inspired technique , 2011 .
[2] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[3] Houbing Song,et al. ESOT: a new privacy model for preserving location privacy in Internet of Things , 2018, Telecommun. Syst..
[4] Jinquan Zeng,et al. Research on immunity-based intrusion detection technology for the Internet of Things , 2011, 2011 Seventh International Conference on Natural Computation.
[5] Salwani Abdullah,et al. Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks , 2018, IEEE Access.
[6] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[7] Jaime Lloret,et al. A secure and low-energy zone-based wireless sensor networks routing protocol for pollution monitoring , 2016, Wirel. Commun. Mob. Comput..
[8] Paul Fremantle,et al. A security survey of middleware for the Internet of Things , 2015 .
[9] Houbing Song,et al. SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks , 2016, Secur. Commun. Networks.
[10] Jaydip Sen,et al. An Agent-Based Intrusion Detection System for Local Area Networks , 2010, Int. J. Commun. Networks Inf. Secur..
[11] Mahdi H. Miraz,et al. A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT) , 2015, 2015 Internet Technologies and Applications (ITA).
[12] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[13] Hassan Bevrani,et al. Multi-agent systems in control engineering: a survey , 2009 .
[14] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[15] Waqas Aman. Assessing the Feasibility of Adaptive Security Models for the Internet of Things , 2016, HCI.
[16] Muhammad Waseem,et al. A Review on Internet of Things (IoT) , 2015 .
[17] Wei Kuang Lai,et al. A Machine Learning System for Routing Decision-Making in Urban Vehicular Ad Hoc Networks , 2015, Int. J. Distributed Sens. Networks.
[18] Richard Tynan,et al. Autonomic wireless sensor networks , 2004, Eng. Appl. Artif. Intell..
[19] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[20] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[21] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[22] Jiafu Wan,et al. Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.
[23] Muhammad Nasuha Mansor,et al. The Potential of Radio Frequency Identification (RFID) Technology Implementation in Malaysian Shipbuilding Industry , 2015 .
[24] Fatiha Djemili Tolba,et al. MASID: Multi-Agent System for Intrusion Detection in MANET , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[25] K. Venugopal Rao,et al. DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey , 2014 .
[26] Wanlei Zhou,et al. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.
[27] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[28] Busra Ozdenizci,et al. A Survey on Near Field Communication (NFC) Technology , 2012, Wireless Personal Communications.
[29] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[30] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[31] Houbing Song,et al. ESBL: An Energy-Efficient Scheme by Balancing Load in Group Based WSNs , 2016, KSII Trans. Internet Inf. Syst..
[32] Klaus Kabitzsch,et al. Performance analysis of the EnOcean wireless sensor network protocol , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).
[33] Houbing Song,et al. ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks , 2017, Ad Hoc Networks.
[34] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[35] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[36] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[37] Omar Said. Development of an Innovative Internet of Things Security System , 2013 .