A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks
暂无分享,去创建一个
[1] Aidong Zhang,et al. An adaptive density-based clustering algorithm for spatial database with noise , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[2] Burak Kantarci,et al. On the Feasibility of Deep Learning in Sensor Network Intrusion Detection , 2019, IEEE Networking Letters.
[3] Md Zahangir Alom,et al. Network intrusion detection for cyber security using unsupervised deep learning approaches , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).
[4] Stephen J. Roberts,et al. Dynamic Bayesian Combination of Multiple Imperfect Classifiers , 2012, Decision Making and Imperfection.
[5] Pierre-François Marteau,et al. Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX Dataset , 2018, 2018 1st International Conference on Data Intelligence and Security (ICDIS).
[6] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[7] Sanghyun Seo,et al. Improvement of Network Intrusion Detection Accuracy by Using Restricted Boltzmann Machine , 2016, 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN).
[8] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[9] Hyun-Chul Kim,et al. Bayesian Classifier Combination , 2012, AISTATS.
[10] Dandan Liu,et al. DL-IDS: a deep learning-based intrusion detection framework for securing IoT , 2019, Trans. Emerg. Telecommun. Technol..
[11] Gulshan Kumar,et al. The use of artificial intelligence based techniques for intrusion detection: a review , 2010, Artificial Intelligence Review.
[12] Bilal Maqbool Beigh,et al. Performance evaluation of different intrusion detection system: An empirical approach , 2014, 2014 International Conference on Computer Communication and Informatics.
[13] Amparo Alonso-Betanzos,et al. Conversion methods for symbolic features: A comparison applied to an intrusion detection problem , 2009, Expert Syst. Appl..
[14] Mamun Bin Ibne Reaz,et al. A novel SVM-kNN-PSO ensemble method for intrusion detection system , 2016, Appl. Soft Comput..
[15] M. Govindarajan,et al. Evaluation of Ensemble Classifiers for Intrusion Detection , 2016 .
[16] Shian-Shyong Tseng,et al. Two-phase clustering process for outliers detection , 2001, Pattern Recognit. Lett..
[17] H. T. Mouftah,et al. Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[18] Thar Baker,et al. Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.
[19] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[20] M. Asaka,et al. A method of tracing intruders by use of mobile agents , 1999 .
[21] Ridwan Nur Wibowo,et al. NSL-KDD Dataset , 2019 .
[22] Zhen Liu,et al. SmoteAdaNL: a learning method for network traffic classification , 2016, J. Ambient Intell. Humaniz. Comput..
[23] Burak Kantarci,et al. Machine Learning-based Prevention of Battery-oriented Illegitimate Task Injection in Mobile Crowdsensing , 2019, WiseML@WiSec.
[24] Yaser Jararweh,et al. An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.
[25] Sidi-Mohammed Senouci,et al. Recent advances on security and privacy in intelligent transportation systems (ITSs) , 2019, Ad Hoc Networks.
[26] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.