A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks
暂无分享,去创建一个
Yuanming Wu | Zhe Dong | Hao Fu | Yinghong Liu | Yuanming Wu | Hao Fu | Yinghong Liu | Zhe Dong
[1] Yuanming Wu. An energy-balanced loop-free routing protocol for distributed wireless sensor networks , 2017, Int. J. Sens. Networks.
[2] Ronnie Johansson,et al. Choosing DBSCAN Parameters Automatically using Differential Evolution , 2014 .
[3] Hong Wang,et al. Shared-nearest-neighbor-based clustering by fast search and find of density peaks , 2018, Inf. Sci..
[4] Cheng Wang,et al. A fast clustering algorithm based on pruning unnecessary distance computations in DBSCAN for high-dimensional data , 2018, Pattern Recognit..
[5] H. T. Mouftah,et al. Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[6] Zhuo Lu,et al. Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[7] Inderjit S. Dhillon,et al. Refining clusters in high dimensional text data , 2003 .
[8] Peng Liu,et al. VDBSCAN: Varied Density Based Spatial Clustering of Applications with Noise , 2007, 2007 International Conference on Service Systems and Service Management.
[9] Yuanming Wu,et al. Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN , 2014 .
[10] Gong Shufeng Zhang Yanfeng,et al. EDDPC: An Efficient Distributed Density Peaks Clustering Algorithm , 2016 .
[11] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[12] Abhijit Das,et al. An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[13] Aidong Zhang,et al. An adaptive density-based clustering algorithm for spatial database with noise , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[14] Hai Zhou,et al. A Security Mechanism for Cluster-Based WSN against Selective Forwarding , 2016, Sensors.
[15] Peter J. Rousseeuw,et al. Clustering by means of medoids , 1987 .
[16] Yuanming Wu,et al. A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks , 2019, Wirel. Pers. Commun..
[17] Guangzhong Xie,et al. A novel stable selection and reliable transmission protocol for clustered heterogeneous wireless sensor networks , 2010, Comput. Commun..
[18] Yuanming Wu,et al. The Diffusion Clustering Scheme and Hybrid Energy Balanced Routing Protocol (DCRP) in Multi-hop Wireless Sensor Networks , 2019, Ad Hoc Sens. Wirel. Networks.
[19] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[20] Hae-Sang Park,et al. A simple and fast algorithm for K-medoids clustering , 2009, Expert Syst. Appl..
[21] Tian Zhang,et al. BIRCH: an efficient data clustering method for very large databases , 1996, SIGMOD '96.
[22] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[23] Simon Fong,et al. DBSCAN: Past, present and future , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).
[24] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[25] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[26] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[27] Pavel Berkhin,et al. A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.
[28] Sean Hughes,et al. Clustering by Fast Search and Find of Density Peaks , 2016 .
[29] Nikita V. Mahajan,et al. Performance Evaluation of Wireless Sensor Network under Black Hole Attack , 2014 .
[30] Erkki Oja,et al. Rival penalized competitive learning for clustering analysis, RBF net, and curve detection , 1993, IEEE Trans. Neural Networks.
[31] Yan Lindsay Sun,et al. Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[32] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[33] D.K. Bhattacharyya,et al. An improved sampling-based DBSCAN for large spatial databases , 2004, International Conference on Intelligent Sensing and Information Processing, 2004. Proceedings of.
[34] Yasuhisa Takizawa,et al. Cooperative detection for falsification and isolation of malicious nodes for wireless sensor networks in open environment , 2017, 2017 IEEE Asia Pacific Microwave Conference (APMC).
[35] Younghwan Yoo,et al. A security framework for Cluster-based Wireless Sensor Networks against the selfishness problem , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.
[36] Ge Yu,et al. Efficient Distributed Density Peaks for Clustering Large Data Sets in MapReduce , 2016, IEEE Transactions on Knowledge and Data Engineering.
[37] Jiong Yang,et al. STING: A Statistical Information Grid Approach to Spatial Data Mining , 1997, VLDB.
[38] Sudipto Guha,et al. CURE: an efficient clustering algorithm for large databases , 1998, SIGMOD '98.
[39] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[40] Ulrike von Luxburg,et al. A tutorial on spectral clustering , 2007, Stat. Comput..
[41] Yufei Tao,et al. DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation , 2015, SIGMOD Conference.