An IoT Anomaly Detection Model Based on Artificial Immunity
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[2] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[3] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[4] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[5] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[6] Sencun Zhu,et al. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[7] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[8] Jacky Hartnett,et al. Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .
[9] Xiao Ren. Artificial Immune System: Principle, Models, Analysis and Perspectives , 2002 .