Data mining approach to analyzing intrusion detection of wireless sensor network
暂无分享,去创建一个
Shamim Ripon | Shamse Tasnim Cynthia | Alauddin Rezvi | Sidratul Moontaha | Khadija Akter Trisha | Shamim Ripon | S. Moontaha | Alauddin Rezvi | Khadija Akter Trisha
[1] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[2] Nathalie Japkowicz,et al. The class imbalance problem: A systematic study , 2002, Intell. Data Anal..
[3] M. Ahsan Latif,et al. ANN-Based Data Mining for Better Resource Management in the Next Generation Wireless Networks , 2016, 2016 International Conference on Frontiers of Information Technology (FIT).
[5] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[6] Khalid Satori,et al. Preventing Black Hole Attack in Wireless Sensor Network Using HMM , 2019, Procedia Computer Science.
[7] Taehwan Park,et al. An Effective Classification for DoS Attacks in Wireless Sensor Networks , 2018, 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN).
[8] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[9] Luigi Coppolino,et al. Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[10] Hao Zhu,et al. An Energy Balanced Clustering Algorithm Based on LEACH Protocol , 2013 .
[11] Riyanarto Sarno,et al. Performance analysis of wireless sensor network with load balancing for data transmission using xbee zb module , 2020 .
[12] Farrukh Aslam Khan,et al. Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.
[13] Noviyanti Santoso,et al. Integration of synthetic minority oversampling technique for imbalanced class , 2019, Indonesian Journal of Electrical Engineering and Computer Science.
[14] Mousa Al-Akhras,et al. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.
[15] Wendi Heinzelman,et al. Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .
[16] Subir Halder,et al. Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches , 2013, Wireless Networks and Security.
[17] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[18] Mehdi J. Marie,et al. Performance evaluation of wireless sensor networks using LEACH protocol , 2020 .
[19] Ali Miri,et al. An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[20] Ismail Musirin,et al. Network intrusion detection system by using genetic algorithm , 2019 .
[21] Rasim M. Alguliev,et al. Hierarchical routing in wireless sensor networks: a survey , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[22] Ademola P. Abidoye,et al. Denial of Service Attacks in Wireless Sensor Networks with Proposed Countermeasures , 2018 .
[23] Dejan Simić,et al. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks , 2018 .
[24] Ruirui Zhang,et al. Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.