Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm
暂无分享,去创建一个
[1] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[2] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[3] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[4] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[5] Helena Szczerbicka,et al. Immuno-inspired Knowledge Management for Ad Hoc Wireless Networks , 2010, Smart Information and Knowledge Management.
[6] Julie Greensmith,et al. The dendritic cell algorithm , 2007 .
[7] Uwe Aickelin,et al. Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.
[8] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[9] Sunil Taneja,et al. A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .
[10] Jean-Yves Le Boudec,et al. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks , 2005, IEEE Transactions on Neural Networks.
[11] Jean-Yves Le Boudec,et al. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..
[12] Gu Ji-yan,et al. The Dendritic Cell Algorithm , 2011 .
[13] Mingzeng Hu,et al. A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[14] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[15] Robert L. Fanelli. Further Experimentation with Hybrid Immune Inspired Network Intrusion Detection , 2010, ICARIS.
[16] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[17] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[18] Julie Greensmith,et al. Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.