FBMT: fuzzy based merkle technique for detecting and mitigating malicious nodes in sensor networks
暂无分享,去创建一个
[1] Robert LIN,et al. NOTE ON FUZZY SETS , 2014 .
[2] Kerim Goztepe,et al. Designing Fuzzy Rule Based Expert System for Cyber Security , 2012 .
[3] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[5] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[6] Umamakeswari Arumugam,et al. Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.
[7] Iman Attarzadeh,et al. A NOVEL APPROACH FOR FAULTY NODE DETECTION W ITH THE AID OFFUZZY THEORY AND M AJORITY VOTING IN W IRELESS SENSOR NETWORKS , 2012 .
[8] Annie Mathew,et al. A survey on various detection techniques of sinkhole attacks in WSN , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).
[9] Sivakami Raja,et al. Performance comparison of neuro-fuzzy cloud intrusion detection systems , 2016, Int. Arab J. Inf. Technol..
[10] Jimmi Grönkvist,et al. Evaluation of a Specification-Based Intrusion Detection System for AODV , 2007 .
[11] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[12] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[13] Jatinder Singh,et al. A cross-layer based intrusion detection technique for wireless networks , 2012, Int. Arab J. Inf. Technol..
[14] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[15] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[17] Kamalanathan Chandran,et al. Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing , 2016, Int. Arab J. Inf. Technol..
[18] G. Santhi,et al. A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks , 2017 .