Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
暂无分享,去创建一个
Shahaboddin Shamshirband | Ajith Abraham | Nor Badrul Anuar | Ahmed Patel | Miss Laiha Mat Kiah | N. B. Anuar | M. L. M. Kiah | A. Abraham | Shahaboddin Shamshirband | Ahmed Patel
[1] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.
[2] Subir Halder,et al. Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches , 2013, Wireless Networks and Security.
[3] S. Selvakumar,et al. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..
[4] Ethem Alpaydin,et al. Introduction to machine learning , 2004, Adaptive computation and machine learning.
[5] Zhiwei Li,et al. Node localization through physical layer network coding: Bootstrap, security, and accuracy , 2012, Ad Hoc Networks.
[6] Yee Wei Law,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.
[7] Bülent Tavli,et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks , 2009, Comput. Stand. Interfaces.
[8] Nauman Aslam,et al. A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks , 2011, Inf. Fusion.
[9] B. K. Panigrahi,et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE , 2010 .
[10] Ahmed Patel,et al. BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[11] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[12] Yifeng Zeng,et al. EXPERIMENTS WITH ONLINE REINFORCEMENT LEARNING IN REAL-TIME STRATEGY GAMES , 2009, Appl. Artif. Intell..
[13] Levente Buttyán,et al. Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.
[14] Yuanjie Li,et al. Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..
[15] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[16] Salman Ahmad Khan,et al. Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.
[17] Maria Papadaki,et al. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.
[18] Kai Hwang,et al. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis , 2006, J. Parallel Distributed Comput..
[19] Zubair A. Baig,et al. GMDH-based networks for intelligent intrusion detection , 2013, Eng. Appl. Artif. Intell..
[20] Chung-Horng Lung,et al. Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy-Efficient and Flexible Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[21] Chung-Horng Lung,et al. Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy-Efficient and Flexible Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[22] Yi Mu,et al. Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..
[23] Wei Li,et al. Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain , 2012, Appl. Soft Comput..
[24] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[25] Sudip Misra,et al. Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..
[26] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[27] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[28] P. Venkata Krishna,et al. LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.
[29] Abdul Hanan Abdullah,et al. Overview of Data Routing Approaches for Wireless Sensor Networks , 2012, Sensors.
[30] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[31] Shahaboddin Shamshirb,et al. Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern , 2010 .
[32] Nirwan Ansari,et al. Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..
[33] Eitan Altman,et al. Non-cooperative spectrum access in cognitive radio networks: A game theoretical model , 2011, Comput. Networks.
[34] Bai Li,et al. Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks , 2009, J. Netw. Comput. Appl..
[35] Issa M. Khalil,et al. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.
[36] Jelena Mirkovic,et al. D-WARD: a source-end defense against flooding denial-of-service attacks , 2005, IEEE Transactions on Dependable and Secure Computing.
[37] P. Venkata Krishna,et al. A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[38] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[39] Steve McGregory,et al. Preparing for the next DDoS attack , 2013, Netw. Secur..
[40] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[41] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[42] Kemal Ertugrul Tepe,et al. Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.
[43] Xuxun Liu,et al. A Survey on Clustering Routing Protocols in Wireless Sensor Networks , 2012, Sensors.
[44] Marimuthu Palaniswami,et al. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.
[45] Heejo Lee,et al. APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks , 2013, Comput. Secur..
[46] Ilker Bekmezci,et al. Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring , 2008, 2008 IEEE Sensors Applications Symposium.
[47] Jiang Li,et al. Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .
[48] Yang Yang,et al. A flow-based network monitoring framework for wireless mesh networks , 2007, IEEE Wireless Communications.
[49] Kang G. Shin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[50] Zahir Tari,et al. Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling , 2013, J. Parallel Distributed Comput..
[51] Yu-Fang Chung,et al. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..
[52] Marília Curado,et al. A reinforcement learning-based routing for delay tolerant networks , 2013, Eng. Appl. Artif. Intell..
[53] Raquel Barco,et al. Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..
[54] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[55] Yaowei Zhou,et al. Key-insulated encryption based group key management for wireless sensor network , 2013 .
[56] Yanheng Liu,et al. Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks , 2013, Comput. Electr. Eng..
[57] Ashraf Darwish,et al. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.
[58] Issa M. Khalil,et al. CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks , 2012, Comput. Networks.