Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures
暂无分享,去创建一个
H. T. Mouftah | Burak Kantarci | Safa Otoum | H. Mouftah | B. Kantarci | S. Otoum | Hussein T. Mouftah | Safa Otoum
[1] K. Raghuveer,et al. Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers , 2013, 2013 International Conference on Computer Communication and Informatics.
[2] Jeremy Straub,et al. Testing automation for an intrusion detection system , 2017, 2017 IEEE AUTOTESTCON.
[3] Annie George,et al. Anomaly Detection based on Machine Learning Dimensionality Reduction using PCA and Classification using SVM , 2012 .
[4] Sushanta Karmakar,et al. A Neural Network based system for Intrusion Detection and attack classification , 2016, 2016 Twenty Second National Conference on Communication (NCC).
[5] Maen Alzubi,et al. Evaluation of machine learning algorithms for intrusion detection system , 2017, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY).
[6] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[7] Tarik Taleb,et al. An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.
[8] Salvatore J. Stolfo,et al. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems , 2002 .
[9] Peter Mark Jansson,et al. Application of power sensors in the control and monitoring of a residential microgrid , 2015, 2015 IEEE Sensors Applications Symposium (SAS).
[10] H. T. Mouftah,et al. Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[11] H. T. Mouftah,et al. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring , 2017, 2017 IEEE International Conference on Communications (ICC).
[12] Aidong Zhang,et al. An adaptive density-based clustering algorithm for spatial database with noise , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[13] Vaibhav Fanibhare,et al. Energy theft detection using AMIDS and cryptographic protection in smart grids , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).
[14] Xin Wang,et al. Efficient Sensor Selection Schemes for Wireless Sensor Networks in Microgrid , 2018, IEEE Systems Journal.
[15] Hesham N. Elmahdy,et al. A New Approach for Evaluating Intrusion Detection System , 2010 .
[16] Mikael Gidlund,et al. Detecting communication blackout in industrial Wireless Sensor Networks , 2016, 2016 IEEE World Conference on Factory Communication Systems (WFCS).
[17] Fulufhelo Vincent Nelwamondo,et al. A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack , 2017, ACIIDS.
[18] Ridha Bouallegue,et al. An optimized weight-based clustering algorithm in wireless sensor networks , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[19] K. Jayshree,et al. Intrusion Detection Using Data Mining Approach , 2014 .
[20] Burak Kantarci,et al. Detection of Known and Unknown Intrusive Sensor Behavior in Critical Applications , 2017, IEEE Sensors Letters.
[21] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[22] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .