Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
暂无分享,去创建一个
[1] Gerhard P. Hancke,et al. Security Challenges for User-Oriented RFID Applications within the "Internet of Things" , 2010 .
[2] Reza Tadayoni,et al. Cyber Security Threats to IoT Applications and Service Domains , 2017, Wireless Personal Communications.
[3] Jun Wang,et al. Parameter estimation for chaotic systems using a hybrid adaptive cuckoo search with simulated annealing algorithm. , 2014, Chaos.
[4] Joseph Alexander Brown,et al. A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures , 2020, Comput..
[5] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[6] Francesco Palmieri,et al. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios , 2019, J. Syst. Archit..
[7] Jemal H. Abawajy,et al. Identifying cyber threats to mobile-IoT applications in edge computing paradigm , 2018, Future Gener. Comput. Syst..
[8] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[9] Li D. Xu. Information architecture for supply chain quality management , 2011 .
[10] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[11] Didier Colle,et al. Intelligent optical networking for multilayer survivability , 2002 .
[12] Hong Yu,et al. Estimation of Surface Duct Using Ground-Based GPS Phase Delay and Propagation Loss , 2018, Remote. Sens..
[13] RomanRodrigo,et al. Securing the Internet of Things , 2011 .
[14] Ravneet Kaur. Advances in Intrusion Detection System for WLAN , 2011, Adv. Internet Things.
[15] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[16] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[17] Ali Ismail Awad,et al. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.
[18] Amir Hossein Gandomi,et al. Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems , 2011, Engineering with Computers.
[19] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[20] Muhammad Ahsan Latif,et al. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.
[21] D. Calafiore,et al. Medial Displacement Calcaneal Osteotomy for Unilateral Adult Acquired Flatfoot: Effects of Minimally Invasive Surgery on Pain, Alignment, Functioning, and Quality of Life. , 2020, The Journal of foot and ankle surgery : official publication of the American College of Foot and Ankle Surgeons.
[22] Ali Dehghantanha,et al. Fuzzy pattern tree for edge malware detection and categorization in IoT , 2019, J. Syst. Archit..
[23] Zeyar Aung,et al. Real-time anomaly-based distributed intrusion detection systems for advanced Metering Infrastructure utilizing stream data mining , 2015, 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).
[24] Wei Chen,et al. An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking , 2018, IEEE Access.
[25] Venkatasamy Sureshkumar,et al. IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics , 2018, Wirel. Pers. Commun..
[26] Matluba Khodjaeva,et al. Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography , 2019, Security, Privacy and Trust in the IoT Environment.
[27] Marilyn Wolf,et al. Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.
[28] Mohammad Shojafar,et al. LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT , 2019, Future Gener. Comput. Syst..
[29] Jianhua Ma,et al. Scalable platforms and advanced algorithms for IoT and cyber-enabled applications , 2018, J. Parallel Distributed Comput..
[30] Chakib Bekara,et al. Security Issues and Challenges for the IoT-based Smart Grid , 2014, FNC/MobiSPC.
[31] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[32] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[33] Samson Hansen Sackey,et al. Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems , 2020 .