An Intrusion Detection Model Based on IPSO-SVM Algorithm in Wireless Sensor Network
暂无分享,去创建一个
Yan Guo | Liejun Wang | Shuang Liu | Hang Zuo | Jiwei Qin
[1] Yu Sheng Chen,et al. Intrusion Detection System Based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network , 2010, ISIA.
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Jingwen Tian,et al. Wireless sensor network for community intrusion detection system based on classify support vector machine , 2009, 2009 International Conference on Information and Automation.
[4] Miljenko Mikuc,et al. Smart Detection and Classification of Application-Layer Intrusions in Web Directories , 2015, Smart Comput. Rev..
[5] Yi Sun,et al. New Developments of Characteristic Analysis in Wireless Sensor Networks , 2016 .
[6] Nemanja Macek,et al. Improving Intrusion Detection with Adaptive Support Vector Machines , 2014 .
[7] Lu Fa. Research of intrusion detection based on GA-LMBP algorithm for wireless sensor network , 2014 .
[8] Hong Gu,et al. Local density one-class support vector machines for anomaly detection , 2011 .
[9] Farrukh Aslam Khan,et al. A survey of Intrusion Detection Systems for Wireless Sensor Networks , 2012, Int. J. Ad Hoc Ubiquitous Comput..
[10] Chen Jinyin,et al. Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing , 2013 .
[11] Shahaboddin Shamshirband,et al. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..
[12] Ning Zhang,et al. An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs , 2016, IEEE Access.
[13] Yassine Maleh,et al. A Global Hybrid Intrusion Detection System for Wireless Sensor Networks , 2015, ANT/SEIT.
[14] Huirong Fu,et al. Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.
[15] Marimuthu Palaniswami,et al. Ellipsoidal neighbourhood outlier factor for distributed anomaly detection in resource constrained networks , 2014, Pattern Recognit..
[16] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[17] Zenggang Xiong,et al. Bayes-Based ARP Attack Detection Algorithm for Cloud Centers , 2016 .
[18] Mani Srivastava,et al. Cooperative sensor anomaly detection using global information , 2013 .
[19] Hui Tian,et al. PCA-Based Network Traffic Anomaly Detection , 2016 .
[20] Zhigang Chen,et al. A Novel Method Based on Clustering Algorithm and SVM for Anomaly Intrusion Detection of Wireless Sensor Networks , 2011 .
[21] Santosh Kumar Majhi,et al. Smart Placement of Security Devices in Cloud Data Center Network , 2015, Smart Comput. Rev..
[22] V. V. Timcenko. An Approach for DDoS Attack Prevention in Mobile ad hoc Networks , 2014 .
[23] Bo Yan,et al. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network , 2015, PloS one.
[24] Mianxiong Dong,et al. A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.
[25] Hong Gu,et al. Anomaly detection combining one-class SVMs and particle swarm optimization algorithms , 2010 .
[26] Russell C. Eberhart,et al. A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.