A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-Based Wireless Sensor Networks
暂无分享,去创建一个
[1] Anang Hudaya Muhamad Amin,et al. Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud Applications , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.
[2] Zubair A. Baig,et al. A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[3] Asad I. Khan,et al. Graph neuron and hierarchical graph neuron, novel approaches toward real time pattern recognition in wireless sensor networks , 2009, IWCMC.
[4] Deborah Estrin,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .
[5] Rasool Jalili,et al. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.
[6] A.I. Khan,et al. CDHT: a clustered DHT communication scheme for serverless (P2P) networks , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[7] Bala Srinivasan,et al. Abnormal Behaviour Detection within Mobile Networks , 2007, MoMM.
[8] M. Isreb,et al. A parallel distributed application of the wireless sensor network , 2004, Proceedings. Seventh International Conference on High Performance Computing and Grid in Asia Pacific Region, 2004..
[9] Anang Hudaya Muhamad Amin,et al. Distributed Multi-Feature Recognition Scheme for Greyscale Images , 2010, Neural Processing Letters.
[10] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[11] Asad I. Khan,et al. Trusted transaction secure network : agent-based distributed security control system for traffic on the Internet , 2021 .
[12] Amiza Amir,et al. A Wheel Graph Structured Associative Memory for Single-Cycle Pattern Recognition within P2P Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[13] Asad Khan,et al. System Infrastructure Design for an End-to-end E-Application for Lab Data Acquisition to Repository Deposition , 2007, iiWAS.
[14] Anang Hudaya Muhamad Amin,et al. One Shot Associative Memory Method for Distorted Pattern Recognition , 2007, Australian Conference on Artificial Intelligence.
[15] Anang Hudaya Muhamad Amin,et al. Collaborative-Comparison Learning for Complex Event Detection Using Distributed Hierarchical Graph Neuron (DHGN) Approach in Wireless Sensor Network , 2009, Australasian Conference on Artificial Intelligence.
[16] M. Isreb,et al. Attributes for modelling Internet traffic patterns and analysis , 2000 .
[17] Asad I. Khan,et al. A Lightweight, Fast and Efficient Distributed Hierarchical Graph Neuron-based Pattern Classifier , 2009 .
[18] A.I. Khan,et al. Dynamic data protocol exchange to handle passive attacks on trusted transient simple network (TTSN) transactions , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[19] Asad I. Khan,et al. Algorithm Exchange of a Security Control System for Web Services Applications , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[20] Manish Parashar,et al. Cooperative Defence Against DDoS Attacks , 2006, J. Res. Pract. Inf. Technol..
[21] Asad I. Khan,et al. Building Context Aware Network of Wireless Sensors Using a Novel Pattern Recognition Scheme Called Hierarchical Graph Neuron , 2009, 2009 IEEE International Conference on Semantic Computing.
[22] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[23] Jun Zheng,et al. An Anomaly Intrusion Detection System Based on Vector Quantization , 2006, IEICE Trans. Inf. Syst..
[24] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[25] Asad I. Khan,et al. Towards dynamic data grid framework for eResearch , 2006, ACSW.
[26] Patrik Mihailescu,et al. Parallel pattern recognition computations within a wireless sensor network , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[27] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[28] Asad I. Khan,et al. An autonomous clustering algorithm for serverless peer-to-peer systems , 2003 .
[29] Zubair A. Baig,et al. SGSIA-in-Network Data Preprocessing for Secure Grid-Sensor Integration , 2006, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06).
[30] Asad I. Khan,et al. A Hierarchical Graph Neuron Scheme for Real-Time Pattern Recognition , 2008, IEEE Transactions on Neural Networks.
[31] Asad I. Khan,et al. Computational Structures Technology Internet Based Engineering Education , 1998 .
[32] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[33] Anantha Chandrakasan,et al. Dynamic Power Management in Wireless Sensor Networks , 2001, IEEE Des. Test Comput..
[34] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[35] J. Elliott,et al. Distributed denial of service attacks and the zombie ant effect , 2000 .
[36] Anang Hudaya Muhamad Amin,et al. A distributed event detection scheme for wireless sensor networks , 2009, MoMM.
[37] Kuei-Ping Shih,et al. Distributed direction-based localization in wireless sensor networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[38] Anang Hudaya Muhamad Amin,et al. Single-Cycle Image Recognition Using an Adaptive Granularity Associative Memory Network , 2008, Australasian Conference on Artificial Intelligence.
[39] Asad I. Khan,et al. A peer-to-peer associative memory network for intelligent information systems , 2002 .
[40] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[41] Anang Hudaya Muhamad Amin,et al. Parallel Pattern Recognition Using a Single-Cycle Learning Approach within Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[42] Virgil D. Gligor,et al. Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion) , 2003, Security Protocols Workshop.
[43] Peng Ning,et al. A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.
[44] Anang Hudaya Muhamad Amin,et al. A divide-and-distribute approach to single-cycle learning HGN network for pattern recognition , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.
[45] A.I. Khan,et al. Analysis of Pattern Recognition Algorithms Using Associative Memory Approach: A Comparative Study between the Hopfield Network and Distributed Hierarchical Graph Neuron (DHGN) , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[46] Asad I. Khan,et al. Evolution of Information Retrieval in Cloud Computing by Redesigning Data Management Architecture from a Scalable Associative Computing Perspective , 2010, ICONIP.
[47] Wei Ye,et al. CDHT: the design of a clustered DHT routing scheme for serverless (P2P) networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[48] Mustafa Isreb,et al. Synthesis Based Software Engineering Design for Automotive Industry , 1998 .
[49] Sergio D. Servetto,et al. Asymptotically optimal time synchronization in dense sensor networks , 2003, WSNA '03.
[50] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[51] A.I. Khan,et al. Energy-Efficient Pattern Recognition Approach for Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[52] M. Isreb,et al. An internet-4MAT-CAL system for adaptive finite element mesh refinement , 2000 .
[53] A.I. Khan,et al. An agent based approach to discovery and formation of the serverless core network , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[54] Asad I. Khan,et al. A performance comparison using automatic, semi-automatic, and manual parallelisation tools , 2001 .
[55] Mustafa Isreb,et al. Parrallelising Finite Elements Equation Solver for Power Indu7stry Infrastructures , 1999 .
[56] Ali A. Ghorbani,et al. Network intrusion detection using an improved competitive learning neural network , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..
[57] Hyunsoo Kim,et al. Estimation of the Optimal Number of Cluster-Heads in Sensor Network , 2005, KES.
[58] Anang Hudaya Muhamad Amin,et al. Lightweight and distributed attack detection scheme in mobile ad hoc networks , 2009, MoMM.
[59] M. Isreb,et al. Internet Traffic Congestion Modelling and Parallel Distributed Analysis , 2003, ISPA.
[60] Zubair A. Baig,et al. Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks , 2005, EUC Workshops.
[61] Anang Hudaya Muhamad Amin,et al. Commodity-Grid Based Distributed Pattern Recognition Framework , 2008, AusGrid.
[62] Wei Ye,et al. Distributed network file storage for a serverless (P2P) network , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..