Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems
暂无分享,去创建一个
[1] Antonio Liotta,et al. Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.
[2] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[3] P. Venkata Krishna,et al. LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.
[4] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[5] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[6] Yu Chen,et al. Ultra-lightweight deep packet anomaly detection for Internet of Things devices , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).
[7] Yan Fu,et al. Investigating the Temporal Effect of User Preferences with Application in Movie Recommendation , 2017, Mob. Inf. Syst..
[8] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[9] Mohamed Hefeeda,et al. Dynamic input anomaly detection in interactive multimedia services , 2018, MMSys.
[10] Ding-Zhu Du,et al. Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..
[11] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[12] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[13] Yang Xiao,et al. Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..
[14] P. Arun Raj Kumar,et al. Improving Adhoc wireless sensor networks security using distributed automaton , 2018, Cluster Computing.
[15] Jana Krimmling,et al. Integration and evaluation of intrusion detection for CoAP in smart city applications , 2014, 2014 IEEE Conference on Communications and Network Security.
[16] Gang Wang,et al. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.
[17] Jin Cao,et al. An Automata Based Intrusion Detection Method for Internet of Things , 2017, Mob. Inf. Syst..
[18] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[19] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[20] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[21] Tom Fawcett,et al. Robust Classification for Imprecise Environments , 2000, Machine Learning.
[22] Chen Jun,et al. Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
[23] Ahod Alghuried,et al. A Model for Anomalies Detection in Internet of Things (IoT) Using Inverse Weight Clustering and Decision Tree. , 2017 .
[24] Guangjie Han,et al. Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[25] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[26] Craig A. Knoblock,et al. A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..
[27] Christopher Leckie,et al. Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..
[28] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[29] Mauro Conti,et al. RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[30] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[31] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[32] FischerMathias,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015 .