A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks
暂无分享,去创建一个
Amandeep Kaur | Mandeep Singh | Navjyot Kaur | Gaurav Pushkarna | A. Kaur | Mandeep Singh | Navjyot Kaur | Gaurav Pushkarna
[1] G. P. Obi Reddy,et al. Evaluation of Best First Decision Tree on Categorical Soil Survey Data for Land Capability Classification , 2013 .
[2] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[3] P. Truchly,et al. Intuitive graphical interface for network simulator 2 supporting trainings in computer networks , 2014, 2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA).
[4] Gregory J. Pottie,et al. Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..
[5] Chi-Tsun Cheng,et al. A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks , 2011, IEEE Sensors Journal.
[6] D. Puccinelli,et al. Wireless sensor networks: applications and challenges of ubiquitous sensing , 2005, IEEE Circuits and Systems Magazine.
[7] Ahmed Toumanari,et al. Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection , 2015 .
[8] Murat Dener,et al. Smart Technologies with Wireless Sensor Networks , 2015 .
[9] Mandeep Singh,et al. Detection of black hole in Wireless Sensor Network based on Data Mining , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[10] Lawrence Jenkins. Title: Challenges in deployment of wireless sensor networks , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).
[11] Amy L. Murphy,et al. What does model-driven data acquisition really achieve in wireless sensor networks? , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[12] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[13] W. N. H. W. Mohamed,et al. A comparative study of Reduced Error Pruning method in decision tree algorithms , 2012, 2012 IEEE International Conference on Control System, Computing and Engineering.
[14] Sang-Hyun Park,et al. A study on sensor nodes attestation protocol in a Wireless Sensor Network , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[15] Xue Wang,et al. Distributed Visual-Target-Surveillance System in Wireless Sensor Networks , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[16] Luigi Coppolino,et al. Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[17] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[18] Ossama Younis,et al. Node clustering in wireless sensor networks: recent developments and deployment challenges , 2006, IEEE Network.
[19] M. Singh,et al. Detection of Malicious Node in Wireless Sensor Network Based on Data Mining , 2012, 2012 International Conference on Computing Sciences.
[20] A. Praveena,et al. Achieving energy efficient and secure communication in wireless sensor networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.
[21] Ren Yueqing,et al. A study on topological characteristics of wireless sensor network based on complex network , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[22] Hesham El-Rewini,et al. Adaptive Constraint-Based Multi-Objective Routing for Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.
[23] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.