A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks
暂无分享,去创建一个
Helena Rifà-Pous | Victor Garcia-Font | Carles Garrigues | H. Rifà-Pous | Victor Garcia-Font | Carles Garrigues
[1] Christopher Leckie,et al. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..
[2] Albert Y. Zomaya,et al. DLS: A dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks , 2013, J. Netw. Comput. Appl..
[3] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[4] D. Morganstein. Practical Sampling Techniques , 1999 .
[5] Ling Zhuang,et al. Parameter Optimization of Kernel-based One-class Classifier on Imbalance Learning , 2006, J. Comput..
[6] Luca Salgarelli,et al. Support Vector Machines for TCP traffic classification , 2009, Comput. Networks.
[7] L. Nachman,et al. PIPENET: A Wireless Sensor Network for Pipeline Monitoring , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[8] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[9] Chih-Jen Lin,et al. Training v-Support Vector Classifiers: Theory and Algorithms , 2001, Neural Computation.
[10] David R. Morganstein,et al. Practical Sampling Techniques , 1999, Technometrics.
[11] Doohwan Oh,et al. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems , 2013, Sensors.
[12] Andrew Y. Ng,et al. Parsing Natural Scenes and Natural Language with Recursive Neural Networks , 2011, ICML.
[13] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[14] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[15] Ronen Feldman,et al. The Data Mining and Knowledge Discovery Handbook , 2005 .
[16] Yunqian Ma,et al. Practical selection of SVM parameters and noise estimation for SVM regression , 2004, Neural Networks.
[17] Athanassios Boulis,et al. Performance and scalability evaluation of the Castalia wireless sensor network simulator , 2010, SimuTools.
[18] Qin Yu,et al. An Improved ARIMA-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.
[19] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[20] Denise Dudek. Lightweight Anomaly Detection for Wireless Sensor Networks , 2015 .
[21] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[22] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[23] Joan Arnedo-Moreno,et al. ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[24] Yacine Challal,et al. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks , 2011, J. Netw. Comput. Appl..
[25] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[26] Koen Langendoen,et al. An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.
[27] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[28] Lior Rokach,et al. Data Mining And Knowledge Discovery Handbook , 2005 .
[29] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[30] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[31] Qi Qi,et al. Wireless Sensor-Based Traffic Light Control , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[32] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[33] Deborah Estrin,et al. Advances in network simulation , 2000, Computer.
[34] Caroline Petitjean,et al. One class random forests , 2013, Pattern Recognit..
[35] Ling Liu,et al. Encyclopedia of Database Systems , 2009, Encyclopedia of Database Systems.
[36] Kurt Hornik,et al. Misc Functions of the Department of Statistics, ProbabilityTheory Group (Formerly: E1071), TU Wien , 2015 .
[37] Y. Zhang,et al. – 20 Statistics-based outlier detection for wireless sensor networks , 2012 .
[38] Anant Kr. Jaiswal,et al. A Novel Analysis of T Mac and S Mac Protocol for Wireless Sensor Networks Using Castalia , 2012 .
[39] Saad B. Qaisar,et al. Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: a survey , 2012, Artificial Intelligence Review.
[40] Dae-Wha Seo,et al. A Lightweight and Effective Jamming Detection in Electronic Shelf Label Systems , 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications.
[41] M. Tahar Kechadi,et al. CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.
[42] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[43] Fionn Murtagh,et al. Ward’s Hierarchical Agglomerative Clustering Method: Which Algorithms Implement Ward’s Criterion? , 2011, Journal of Classification.
[44] Daowei Liu,et al. Anomaly Detection of Single Sensors Using OCSVM_KNN , 2015, BigCom.
[45] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[46] Luís Torgo,et al. Data Mining with R: Learning with Case Studies , 2010 .
[47] Young-Joo Kim,et al. SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[48] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[49] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[50] Charalampos Konstantopoulos,et al. Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.
[51] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .