Deep learning in cyber security for internet of things
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[3] Andrew W. Moore,et al. Rule-based anomaly pattern detection for detecting disease outbreaks , 2002, AAAI/IAAI.
[4] Ali A. Ghorbani,et al. Network Intrusion Detection and Prevention - Concepts and Techniques , 2010, Advances in Information Security.
[5] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[6] Matthew D. Zeiler. ADADELTA: An Adaptive Learning Rate Method , 2012, ArXiv.
[7] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[8] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[9] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[10] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[11] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[12] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[13] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[14] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[15] Valerio Formicola,et al. Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees , 2013, EWDC.
[16] Rajamani Vayanaperumal,et al. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method , 2015, TheScientificWorldJournal.
[17] Jill Slay,et al. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.
[18] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[19] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[20] Marcus A. Maloof. MACHINE LEARNING AND DATA MINING FOR COMPUTER SECURITY: METHODS AND APPLICATIONS , 2011 .
[21] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[22] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[23] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[24] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[25] Marcos Augusto M. Vieira,et al. Survey on wireless sensor network devices , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[26] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[27] Maninder Singh,et al. Efficient hybrid technique for detecting zero-day polymorphic worms , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[28] Yoram Singer,et al. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization , 2011, J. Mach. Learn. Res..
[29] Nirvana Meratnia,et al. Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine , 2013, Ad Hoc Networks.
[30] Balachander Krishnamurthy,et al. Rule-Based Anomaly Detection on IP Flows , 2009, IEEE INFOCOM 2009.
[31] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[32] Remi Badonnel,et al. A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..
[33] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[34] Sargolzaei Arman,et al. Epilepsy, a Cyberattack on Brains' Networked Control System , 2016 .
[35] Salim Hariri,et al. Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[36] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[37] Omer F. Rana,et al. Predicting client-side attacks via behaviour analysis using honeypot data , 2011, 2011 7th International Conference on Next Generation Web Services Practices.
[38] Gaël Varoquaux,et al. The NumPy Array: A Structure for Efficient Numerical Computation , 2011, Computing in Science & Engineering.
[39] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[40] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[41] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[42] Anand Nayyar,et al. Mint-Route to Avoid Congestion in Wireless Sensor Network , 2014 .
[43] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[44] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[45] Zheng Zhang,et al. HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[46] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[47] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[48] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[49] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[50] Stefano Chessa,et al. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..
[51] Hon Sun Chiu,et al. Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .
[52] Ivan Martinovic,et al. Crowdsourcing security for wireless air traffic communications , 2017, 2017 9th International Conference on Cyber Conflict (CyCon).
[53] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[54] Ran Wolff,et al. In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.
[55] Kevin B. Korb,et al. Anomaly detection in vessel tracks using Bayesian networks , 2014, Int. J. Approx. Reason..
[56] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[57] Sema F. Oktug,et al. RPL version number attacks: In-depth study , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[58] Wes McKinney,et al. Data Structures for Statistical Computing in Python , 2010, SciPy.
[59] M. Hemanth Kumar,et al. Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks , 2019 .
[60] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[61] Camilius A. Sanga,et al. A Survey on Detection of Sinkhole Attack in Wireless Sensor Network , 2015, ArXiv.
[62] Alexander Perez-Pons,et al. HMM-Based Intrusion Detection System for Software Defined Networking , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[63] Zhang Yang,et al. An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[64] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[65] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[66] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[67] José Manuel Moya,et al. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes , 2012, Sensors.
[68] Tanupriya Choudhury,et al. Securing the Internet of Things: A proposed framework , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[69] Luigi Coppolino,et al. An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).
[70] Ken Ferens,et al. Network Intrusion Detection Using Machine Learning , 2016 .
[71] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[72] Li Deng,et al. A tutorial survey of architectures, algorithms, and applications for deep learning , 2014, APSIPA Transactions on Signal and Information Processing.
[73] Edgar H. Callaway,et al. Wireless Sensor Networks: Architectures and Protocols , 2003 .
[74] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[75] Ethem Alpaydin,et al. Introduction to machine learning , 2004, Adaptive computation and machine learning.
[76] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.