A biologically-inspired type-2 fuzzy set based algorithm for detecting misbehaving nodes in ad-hoc wireless networks
暂无分享,去创建一个
[1] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[2] Jerry M. Mendel,et al. Centroid of a type-2 fuzzy set , 2001, Inf. Sci..
[3] Jerry M. Mendel,et al. Uncertainty bounds and their use in the design of interval type-2 fuzzy logic systems , 2002, IEEE Trans. Fuzzy Syst..
[4] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[5] Gerold Schuler,et al. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.
[6] Hooman Tahayori,et al. Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[7] Julie Greensmith,et al. Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory , 2010, ArXiv.
[8] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[9] Jerry M. Mendel,et al. Computing with words and its relationships with fuzzistics , 2007, Inf. Sci..
[10] Helena Szczerbicka,et al. AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.
[11] J. Davies,et al. Molecular Biology of the Cell , 1983, Bristol Medico-Chirurgical Journal.
[12] J. Mendel. Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions , 2001 .
[13] Jean-Yves Le Boudec,et al. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..
[14] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Hooman Tahayori,et al. Distributed-interval type-2 fuzzy set based recognition algorithm for IDS , 2008, 2008 IEEE International Conference on Granular Computing.
[17] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[18] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[19] Paul P Wang. Information Sciences 2007 , 2007 .
[20] Fabio A. González,et al. An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[21] Uwe Aickelin,et al. Cooperative Automated Worm Response and Detection Immune Algorithm , 2005 .
[22] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .