Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks
暂无分享,去创建一个
[1] Ramón Agüero,et al. TCP Performance Enhancement over Wireless Mesh Networks by means of the Combination of Multi-RAT Devices and the MPTCP Protocol , 2014, Netw. Protoc. Algorithms.
[2] Tahseen Ahmed Jilani,et al. Feature Deduction and Ensemble Design of Parallel Neural Networks for Intrusion Detection System , 2010 .
[3] M. Uysal,et al. DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks , 2009, IEEE/ACM Transactions on Networking.
[4] Chunming Qiao,et al. Signaling and Routing Protocols for iCAR , 2007, Ad Hoc Sens. Wirel. Networks.
[5] Monica Mehrotra,et al. Anomaly Intrusion Detection System using Hamming Network Approach , 2010 .
[6] Jonathan Loo,et al. Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting , 2014, Ad Hoc Sens. Wirel. Networks.
[7] Jonathan Loo,et al. Framework for intrusion detection in IEEE 802.11 wireless mesh networks , 2010, Int. Arab J. Inf. Technol..
[8] Lília de Sá Silva,et al. Detecting attack signatures in the real network traffic with ANNIDA , 2008, Expert Syst. Appl..
[9] Jonathan Loo,et al. Intrusion Detection and Security Mechanisms for Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[10] Radhika Priya Ankala,et al. Mobile Agent Based Routing in Manets - Attacks & Defences , 2011, Netw. Protoc. Algorithms.
[11] Rosli Salleh,et al. Security Overview of Wireless Sensor Network , 2013 .
[12] Azizah Abdul Rahman,et al. Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents , 2010, ArXiv.
[13] Mulhim Al Doori,et al. Credit Scoring Model Based on Back Propagation Neural Network Using Various Activation and Error Function , 2014 .
[14] Elijah Blessing Rajsingh,et al. Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks , 2012 .
[15] Patrick P. C. Lee,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.
[16] R.V. Yampolskiy,et al. ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION , 2006, 2006 IEEE Long Island Systems, Applications and Technology Conference.
[17] S. Selvakumar,et al. M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems , 2012 .
[18] Nadeem Javaid,et al. iAMCTD: Improved Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[19] B. B. Gupta,et al. ANN Based Scheme to Predict Number of Zombies in a DDoS Attack , 2012, Int. J. Netw. Secur..
[20] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[21] B. M. Patil,et al. Low-rate DDOS Attack Detection using Optimal Objective Entropy Method , 2013 .
[22] Miguel Garcia,et al. Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks , 2011, J. Netw. Comput. Appl..
[23] David Wetherall,et al. TVA: a DoS-limiting network architecture , 2008, TNET.
[24] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[25] Andrew R. Barron,et al. Universal approximation bounds for superpositions of a sigmoidal function , 1993, IEEE Trans. Inf. Theory.
[26] Erol Gelenbe,et al. Learning in the Recurrent Random Neural Network , 1992, Neural Computation.
[27] Georgios Loukas,et al. A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network , 2007, Comput. J..
[28] Kok-Keong Loo,et al. Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .
[29] Claude E. Shannon,et al. The mathematical theory of communication , 1950 .
[30] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[31] P. V. G. D. Prasad Reddy,et al. Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks , 2011, Netw. Protoc. Algorithms.
[32] S. Selvakumar,et al. Distributed denial of service attack detection using an ensemble of neural classifier , 2011, Comput. Commun..
[33] Selen Cremaschi,et al. An algorithm to determine sample sizes for optimization with artificial neural networks , 2013 .
[34] Virendra Raghuwanshi,et al. Anomaly Base Network Intrusion Detection by Using Random Decision Tree and Random Projection: A Fast Network Intrusion Detection Technique , 2011, Netw. Protoc. Algorithms.
[35] P. Venkata Krishna,et al. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..
[36] Geert Deconinck,et al. Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..
[37] Abdelhakim Hafid,et al. Wireless Mesh Networks Design — A Survey , 2012, IEEE Communications Surveys & Tutorials.