Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks
暂无分享,去创建一个
[1] Lisa Ann Osadciw,et al. Sensor Communication Networks Using Swarming Intelligence , 2003 .
[2] William S. Hortos,et al. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks , 2007, SPIE Optics East.
[3] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[4] William S. Hortos. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks , 2010, Defense + Commercial Sensing.
[5] Masayuki Murata,et al. Self-organizing Anti-phase Synchronization Scheme for Sensor Networks Inspired by Frogs ’ Calling Behavior , 2009 .
[6] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[7] Stefanos Gritzalis,et al. Trust-Based Data Disclosure in Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[8] Philip S. Yu,et al. Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[9] Ganesh K. Venayagamoorthy,et al. Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.
[10] William S. Hortos. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks , 2009, Defense + Commercial Sensing.
[11] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[12] Alessandro Sorniotti,et al. Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .
[13] Lisa Ann Osadciw,et al. Balancing the performance of a sensor network using an ant system , 2003 .