D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
暂无分享,去创建一个
Steven Furnell | Ying Wah Teh | Nor Badrul Anuar | Miss Laiha Mat Kiah | Shahaboddin Shamshirband | Amineh Amini | N. B. Anuar | M. L. M. Kiah | S. Shamshirband | S. Furnell | Teh Ying Wah | A. Amini
[1] John M. Hancock,et al. K -Means Clustering. , 2010 .
[2] Ali S. Hadi,et al. Finding Groups in Data: An Introduction to Chster Analysis , 1991 .
[3] Andries P. Engelbrecht,et al. Computational Intelligence: An Introduction , 2002 .
[4] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[5] Philippe Owezarski,et al. Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..
[6] Kemal Ertugrul Tepe,et al. Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.
[7] Haibin Duan,et al. Imperialist competitive algorithm optimized artificial neural networks for UCAV global path planning , 2014, Neurocomputing.
[8] Reza Tavakkoli-Moghaddam,et al. A new support vector model-based imperialist competitive algorithm for time estimation in new product development projects , 2013 .
[9] Abdul Hanan Abdullah,et al. Imperialist competitive algorithm combined with refined high-order weighted fuzzy time series (RHWFTS-ICA) for short term load forecasting , 2013 .
[10] Junichi Suzuki,et al. MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[11] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[12] Hans-Peter Kriegel,et al. Density-Based Clustering in Spatial Databases: The Algorithm GDBSCAN and Its Applications , 1998, Data Mining and Knowledge Discovery.
[13] Kamran Rezaie,et al. Solving the integrated product mix-outsourcing problem using the Imperialist Competitive Algorithm , 2010, Expert Syst. Appl..
[14] Giandomenico Spezzano,et al. A single pass algorithm for clustering evolving data streams based on swarm intelligence , 2011, Data Mining and Knowledge Discovery.
[15] Xin Jin,et al. K-Means Clustering , 2010, Encyclopedia of Machine Learning.
[16] Edward R. Dougherty,et al. Model-based evaluation of clustering validation measures , 2007, Pattern Recognit..
[17] Martin Ester,et al. Density‐based clustering , 2019, WIREs Data Mining Knowl. Discov..
[18] Fariborz Jolai,et al. A hybrid imperialist competitive algorithm for minimizing makespan in a multi-processor open shop , 2013 .
[19] Ilker Bekmezci,et al. Energy Efficient, Delay Sensitive, Fault Tolerant Wireless Sensor Network for Military Monitoring , 2008, 2008 IEEE Sensors Applications Symposium.
[20] Nitesh Sinha,et al. A fully automated algorithm under modified FCM framework for improved brain MR image segmentation. , 2009, Magnetic resonance imaging.
[21] Levente Buttyán,et al. Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.
[22] Jing Li,et al. A new hybrid method based on partitioning-based DBSCAN and ant clustering , 2011, Expert Syst. Appl..
[23] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[24] Ashraf Darwish,et al. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.
[25] Won Suk Lee,et al. Optimized Clustering for Anomaly Intrusion Detection , 2003, PAKDD.
[26] Mutlu Mete,et al. Fast density-based lesion detection in dermoscopy images , 2011, Comput. Medical Imaging Graph..
[27] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[28] Marimuthu Palaniswami,et al. Labelled data collection for anomaly detection in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[29] Zubair A. Baig,et al. GMDH-based networks for intelligent intrusion detection , 2013, Eng. Appl. Artif. Intell..
[30] Aoying Zhou,et al. Density-Based Clustering over an Evolving Data Stream with Noise , 2006, SDM.
[31] Witold Pedrycz,et al. Anomaly detection in time series data using a fuzzy c-means clustering , 2013, 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS).
[32] S. Selvakumar,et al. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..
[33] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[34] P. Venkata Krishna,et al. A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[35] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[36] Zahir Tari,et al. Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling , 2013, J. Parallel Distributed Comput..
[37] Christian Böhm,et al. Automated detection of brain atrophy patterns based on MRI for the prediction of Alzheimer's disease , 2010, NeuroImage.
[38] Taher Niknam,et al. An efficient hybrid algorithm based on modified imperialist competitive algorithm and K-means for data clustering , 2011, Eng. Appl. Artif. Intell..
[39] Abdul Hanan Abdullah,et al. Optimization of plate-fin heat exchangers by an improved harmony search algorithm , 2013 .
[40] Ying Wah Teh,et al. On Density-Based Data Streams Clustering Algorithms: A Survey , 2014, Journal of Computer Science and Technology.
[41] Amin Hadidi,et al. A new design approach for shell-and-tube heat exchangers using imperialist competitive algorithm (ICA) from economic point of view , 2013 .
[42] Nauman Aslam,et al. A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks , 2011, Inf. Fusion.
[43] Caro Lucas,et al. Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition , 2007, 2007 IEEE Congress on Evolutionary Computation.
[44] Jing Liu,et al. Outlier detection on uncertain data based on local information , 2013, Knowl. Based Syst..
[45] Yi-Ming Chen,et al. Combining density-based clustering and wavelet methods for internal systems anomaly detection , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.
[46] Mostafa Zandieh,et al. A hybrid imperialist competitive algorithm for single-machine scheduling problem with linear earliness and quadratic tardiness penalties , 2013 .
[47] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..
[48] Mahmut C. Selekoglu,et al. How to be Energy Efficient , 2008 .
[49] Yu-Fang Chung,et al. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..
[50] Christopher Leckie,et al. Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.
[51] Yanheng Liu,et al. Predictable Energy Aware Routing based on Dynamic Game Theory in Wireless Sensor Networks , 2013, Comput. Electr. Eng..
[52] Abdul Hanan Abdullah,et al. A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption , 2013 .
[53] Yin Wang,et al. Hybrid bio-inspired lateral inhibition and Imperialist Competitive Algorithm for complicated image matching , 2014 .
[54] Daniel A. Keim,et al. An Efficient Approach to Clustering in Large Multimedia Databases with Noise , 1998, KDD.
[55] Abdul Hanan Abdullah,et al. MOICA: A novel multi-objective approach based on imperialist competitive algorithm , 2013, Appl. Math. Comput..
[57] Nirwan Ansari,et al. Detecting DRDoS attacks by a simple response packet confirmation mechanism , 2008, Comput. Commun..
[58] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[59] C. Guestrin,et al. Distributed regression: an efficient framework for modeling sensor network data , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[60] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..