Outlier detection using naïve bayes in wireless ad hoc networks
暂无分享,去创建一个
[1] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.
[2] Guangjie Han,et al. A Reliable and Efficient Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Intelligent Computer Communication and Processing.
[3] Heikki Mannila,et al. Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.
[4] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..
[5] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[6] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[7] Chris Hankin,et al. Formal Security Analysis for Ad-Hoc Networks , 2006, Electron. Notes Theor. Comput. Sci..
[8] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[9] Davis,et al. Principles of Data Mining , 2001 .
[10] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[11] J. Zhan,et al. A Novel Outlier Detection Scheme for Network Intrusion Detection Systems , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[12] Guangjie Han,et al. A Reliable Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[13] Qiuna Niu. Formal analysis of secure routing protocol for ad hoc networks , 2009, 2009 International Conference on Wireless Communications & Signal Processing.
[14] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .
[15] Kefei Cheng,et al. Rough Set Weighted Naïve Bayesian Classifier in Intrusion Prevention System , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.