Detection of selective-edge packet attack based on edge reputation in IoT networks
暂无分享,去创建一个
Youwei Ding | Liang Liu | Zuchao Ma | Lei Yang | Youwei Ding | Liang Liu | Lei Yang | Zuchao Ma
[1] Xiaojiang Du,et al. IoT malicious traffic identification using wrapper-based feature selection mechanisms , 2020, Comput. Secur..
[2] Hussein Al-Bahadili,et al. Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs , 2016 .
[3] Samuel Marchal,et al. DÏoT: A Federated Self-learning Anomaly Detection System for IoT , 2018, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[4] Theodore B. Zahariadis,et al. A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[5] Weizhi Meng,et al. Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.
[6] Sasu Tarkoma,et al. IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge , 2020, IEEE Transactions on Network and Service Management.
[7] Jong-Moon Chung,et al. Centralized Trust-Based Secure Routing in Wireless Networks , 2018, IEEE Wireless Communications Letters.
[8] Nasser-Eddine Rikli,et al. Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks , 2016, Int. J. Distributed Sens. Networks.
[9] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[10] Philippe Owezarski,et al. Online and Scalable Unsupervised Network Anomaly Detection Method , 2017, IEEE Trans. Netw. Serv. Manag..
[11] Xin Liu,et al. Identifying Malicious Nodes in Multihop IoT Networks Using Diversity and Unsupervised Learning , 2018, 2018 IEEE International Conference on Communications (ICC).
[12] Dan Pei,et al. Why it takes so long to connect to a WiFi access point , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[13] Elisa Bertino,et al. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[14] Reza Fotohi,et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.
[15] Yonghee Kim,et al. A study on the adoption of IoT smart home service: using Value-based Adoption Model , 2017 .
[16] Yongkang Wang,et al. Security algorithm of Internet of Things based on ZigBee protocol , 2018, Cluster Computing.
[17] Jie Li,et al. DeepDDoS: Online DDoS Attack Detection , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[18] Nei Kato,et al. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.
[19] Jiankun Hu,et al. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[20] Liang Liu,et al. Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks , 2019, Future Gener. Comput. Syst..
[21] Naixue Xiong,et al. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks , 2017, The Journal of Supercomputing.
[22] Sneha Kumar Kasera,et al. Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.
[23] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.