A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
暂无分享,去创建一个
[1] Gianluca Dini,et al. DIO Suppression Attack Against Routing in the Internet of Things , 2017, IEEE Communications Letters.
[2] Hui Xiong,et al. A Comprehensive Survey on Transfer Learning , 2019, Proceedings of the IEEE.
[3] Xiaojiang Du,et al. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.
[4] Abdur Rehman,et al. Detection of rank attack in routing protocol for Low Power and Lossy Networks , 2018, Ann. des Télécommunications.
[5] Remi Badonnel,et al. A Study of RPL DODAG Version Attacks , 2014, AIMS.
[6] Virender Ranga,et al. Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review , 2020, IEEE Sensors Journal.
[7] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[8] Dervis Karaboga,et al. A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm , 2007, J. Glob. Optim..
[9] Antonio Robles-Kelly,et al. Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things , 2020, ArXiv.
[10] Furkan Yusuf Yavuz,et al. Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..
[11] Sevil Sen,et al. A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things , 2020, ADHOC-NOW.
[12] Sema F. Oktug,et al. New lightweight mitigation techniques for RPL version number attacks , 2019, Ad Hoc Networks.
[13] John R. Koza,et al. Genetic programming as a means for programming computers by natural selection , 1994 .
[14] Nguyen Quang Uy,et al. Transfer learning in genetic programming , 2015, 2015 IEEE Congress on Evolutionary Computation (CEC).
[15] Sema F. Oktug,et al. RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[16] Wen-Zhan Song,et al. Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing , 2019, IEEE Internet of Things Journal.
[17] Ismail Ahmedy,et al. Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol , 2018, IEEE Access.
[18] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[19] Jonathan Loo,et al. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.
[20] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[21] Eryk Dutkiewicz,et al. Deep Transfer Learning for IoT Attack Detection , 2020, IEEE Access.
[22] Virender Ranga,et al. Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).
[23] Xiang-Yang Li,et al. System Statistics Learning-Based IoT Security: Feasibility and Suitability , 2019, IEEE Internet of Things Journal.
[24] Jonathan Loo,et al. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..
[25] A. E. Eiben,et al. Introduction to Evolutionary Computing , 2003, Natural Computing Series.
[26] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[27] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[28] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[29] Antonio J. Nebro,et al. jMetal: A Java framework for multi-objective optimization , 2011, Adv. Eng. Softw..
[30] Riccardo Poli,et al. Genetic Programming An Introductory Tutorial and a Survey of Techniques and Applications , 2011 .
[31] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[32] Mikael Gidlund,et al. A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).
[33] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[34] Isabelle Chrisment,et al. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks , 2017, IEEE Transactions on Network and Service Management.
[35] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.