A Lightweight Intrusion Detection Method Based on Fuzzy Clustering Algorithm for Wireless Sensor Networks
暂无分享,去创建一个
Ping Wang | Xiaoming Tang | Hongchun Qu | Libiao Lei | Xiaoming Tang | Ping Wang | Hongchun Qu | Libiao Lei
[1] Raimir Holanda Filho,et al. A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.
[2] Jingwen Tian,et al. Wireless sensor network for community intrusion detection system based on classify support vector machine , 2009, 2009 International Conference on Information and Automation.
[3] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[4] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[5] Marimuthu Palaniswami,et al. Labelled data collection for anomaly detection in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[6] Rabie A. Ramadan,et al. Smart outlier detection of wireless sensor network , 2015 .
[7] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[8] Mahdi Abadi,et al. A PCA-based distributed approach for intrusion detection in wireless sensor networks , 2011, 2011 International Symposium on Computer Networks and Distributed Systems (CNDS).
[9] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[10] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[11] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[12] Syed Abdul Sattar,et al. A Collaborative, Secure and Energy Efficient Intrusion Detection Method for Homogeneous WSN , 2011, ACC.
[13] Alfredo Navarra,et al. Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks* , 2008, Int. J. Distributed Sens. Networks.
[14] Yu-Fang Chung,et al. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..
[15] Bernhard Schölkopf,et al. Support Vector Method for Novelty Detection , 1999, NIPS.
[16] Ing-Ray Chen,et al. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.
[17] Jingsha He,et al. Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..
[18] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[19] D. P. Agrawal,et al. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[20] Jonathan Loo,et al. A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..
[21] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[22] Sean Hughes,et al. Clustering by Fast Search and Find of Density Peaks , 2016 .
[23] Li-Yong Ren,et al. Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[24] Ala I. Al-Fuqaha,et al. Detection of Masquerade Attacks on Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[25] Jon Davis,et al. A Survey of Cyber Ranges and Testbeds , 2013 .
[26] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[27] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[28] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[29] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[30] L. Lo,et al. Robin sequence: review of treatment modalities for airway obstruction in 110 cases. , 2002, International journal of pediatric otorhinolaryngology.
[31] Tarek S. Sobh. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.
[32] J. Bezdek,et al. FCM: The fuzzy c-means clustering algorithm , 1984 .
[33] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[34] Guangjie Han,et al. Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[35] Alessandro Laio,et al. Clustering by fast search and find of density peaks , 2014, Science.
[36] Dharma P. Agrawal,et al. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[37] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.