An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks
暂无分享,去创建一个
[1] Helena Szczerbicka,et al. AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.
[2] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Anastasios A. Economides,et al. ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks , 2014, EURASIP J. Inf. Secur..
[4] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[5] Jean-Yves Le Boudec,et al. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks , 2004, BioADIT.
[6] Hossein Pedram,et al. A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents , 2009, 2009 International Conference on Computational Intelligence and Security.
[7] Julie Greensmith,et al. Greensmith, Julie and Aickelin, Uwe and Cayzer, Steve (2005) 'Introducing Dendritic Cells as a Novel Immune- Inspired Algorithm for Anomaly Detection'. In: ICARIS- , 2017 .
[8] Hosam Soleman,et al. SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS , 2014 .
[9] Jonathan Loo,et al. Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting , 2014, Ad Hoc Sens. Wirel. Networks.
[10] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[11] Jean-Yves Le Boudec,et al. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..
[12] Shahaboddin Shamshirband,et al. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..
[13] Ali Miri,et al. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).
[14] Peter J. Bentley,et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.
[15] Guang-Zhong Yang,et al. From computers to ubiquitous computing by 2010: health care , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[16] Vasos Vassiliou,et al. An Intrusion Detection System for Wireless Sensor Networks , 2017, 2017 24th International Conference on Telecommunications (ICT).
[17] Jie Wu,et al. Control Frame Shaping in Power Controlled and Directional MAC Protocols? , 2008, Ad Hoc Sens. Wirel. Networks.
[18] Julie Greensmith,et al. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems , 2010, ArXiv.
[19] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[20] Fengqi Yu,et al. Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[21] R. S. Bhuvaneswaran,et al. DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .
[22] Azween Abdullah,et al. An Energy Efficient Color Based Topology Control Algorithm for Wireless Sensor Networks , 2013 .
[23] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[24] S. Nishanthi. Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm , 2013 .
[25] Jaime Lloret,et al. Bio-Inspired Mechanisms in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[26] Jonathan Timmis,et al. An interdisciplinary perspective on artificial immune systems , 2008, Evol. Intell..
[27] Lu Hong,et al. Danger theory of immune systems and intrusion detection systems , 2009, 2009 International Conference on Industrial Mechatronics and Automation.
[28] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[29] Mohammad Reza Ahmadi,et al. An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) , 2009, Int. J. Netw. Secur..