Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
暂无分享,去创建一个
Shahaboddin Shamshirband | Nor Badrul Anuar | Miss Laiha Mat Kiah | Sanjay Misra | Vala Ali Rohani | Abdul Nasir Khan | Dalibor Petkovic | N. B. Anuar | M. L. M. Kiah | Abdul Nasir Khan | Shahaboddin Shamshirband | S. Misra | D. Petković
[1] Nauman Aslam,et al. A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks , 2011, Inf. Fusion.
[2] Ahmed Patel,et al. BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[3] Yang Yang,et al. A flow-based network monitoring framework for wireless mesh networks , 2007, IEEE Wireless Communications.
[4] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[5] Chung-Ming Ou,et al. Agent-Based Artificial Immune Systems (ABAIS) for Intrusion Detections: Inspiration from Danger Theory , 2013 .
[6] Julie Greensmith,et al. Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.
[7] Heejo Lee,et al. APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks , 2013, Comput. Secur..
[8] Vikas Agrawal,et al. An agent-based simulation system for concert venue crowd evacuation modeling in the presence of a fire disaster , 2014, Expert Syst. Appl..
[9] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[10] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[11] Julie Greensmith,et al. The Dendritic Cell Algorithm for Intrusion Detection , 2013, Biologically Inspired Networking and Sensing.
[12] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..
[13] Mukesh Singhal,et al. An efficient routing algorithm to preserve k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-coverage , 2013, The Journal of Supercomputing.
[14] Kang G. Shin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[15] Jelena Mirkovic,et al. D-WARD: a source-end defense against flooding denial-of-service attacks , 2005, IEEE Transactions on Dependable and Secure Computing.
[16] Mohamed F. Younis,et al. A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.
[17] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[18] Nirwan Ansari,et al. Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..
[19] Ashraf Darwish,et al. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.
[20] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[21] Subir Halder,et al. Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches , 2013, Wireless Networks and Security.
[22] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[23] Feng Xia,et al. Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..
[24] Yu-Fang Chung,et al. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..
[25] K. Shortman,et al. Another heritage for plasmacytoid dendritic cells. , 2013, Immunity.
[26] Sadan Kulturel-Konak,et al. A review of clonal selection algorithm and its applications , 2011, Artificial Intelligence Review.
[27] Zubair A. Baig,et al. GMDH-based networks for intelligent intrusion detection , 2013, Eng. Appl. Artif. Intell..
[28] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[29] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[30] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.
[31] Luci Pirmez,et al. Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.
[32] Maria Papadaki,et al. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.
[33] Ilker Bekmezci,et al. Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring , 2008, 2008 IEEE Sensors Applications Symposium.
[34] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[35] Chung-Ming Ou,et al. Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.
[36] Abdul Hanan Abdullah,et al. Overview of Data Routing Approaches for Wireless Sensor Networks , 2012, Sensors.
[37] John A. Clark,et al. The placement-configuration problem for intrusion detection nodes in wireless sensor networks , 2013, Comput. Electr. Eng..
[38] Henry Y. K. Lau,et al. Artificial Immunity Based Cooperative Sustainment Framework for Multi-Agent Systems , 2010, SGAI Conf..
[39] Tarek S. Sobh,et al. A cooperative immunological approach for detecting network anomaly , 2011, Appl. Soft Comput..
[40] Hirotada Ohashi,et al. A negative selection algorithm for classification and reduction of the noise effect , 2009, Appl. Soft Comput..
[41] Amod Kumar,et al. Improved thresholding based on negative selection algorithm (NSA) , 2014, Evol. Intell..
[42] Azzedine Boukerche,et al. An agent based and biological inspired real-time intrusion detection and security model for computer network operations , 2007, Comput. Commun..
[43] Shahaboddin Shamshirb,et al. Designing a smart multi-agent system based on fuzzy logic to improve the gas consumption pattern , 2010 .
[44] Chung-Horng Lung,et al. Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy-Efficient and Flexible Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[45] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[46] Enzo Baccarelli,et al. Energy-saving self-configuring networked data centers , 2013, Comput. Networks.
[47] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[48] Rajashekhar C. Biradar,et al. A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[49] Kemal Ertugrul Tepe,et al. Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.
[50] Xuxun Liu,et al. A Survey on Clustering Routing Protocols in Wireless Sensor Networks , 2012, Sensors.
[51] Tao Li,et al. Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..
[52] Raquel Barco,et al. Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..
[53] Yaowei Zhou,et al. Key-insulated encryption based group key management for wireless sensor network , 2013 .
[54] Yanheng Liu,et al. Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks , 2013, Comput. Electr. Eng..
[55] Ge Yu,et al. Pulse quarantine strategy of internet worm propagation: Modeling and analysis , 2012, Comput. Electr. Eng..
[56] S. Selvakumar,et al. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..
[57] Lakhmi C. Jain,et al. Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..
[58] Pradeep Ray,et al. Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results , 2012, Inf. Syst. J..
[59] Shukor Abd Razak,et al. Towards providing a new lightweight authentication and encryption scheme for MANET , 2011, Wirel. Networks.
[60] Salman Ahmad Khan,et al. Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.
[61] Walmir M. Caminhas,et al. Design of an artificial immune system based on Danger Model for fault detection , 2010, Expert Syst. Appl..
[62] Kai Hwang,et al. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis , 2006, J. Parallel Distributed Comput..
[63] Levente Buttyán,et al. Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.