Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems
暂无分享,去创建一个
Ashraful Islam | Mazdak Zamani | Chao Liang | Norbik Bashah Idris | Bharanidharan Shanmugam | Sanaz Kavianpour | Sami Azam | Asif Karim | M. Zamani | B. Shanmugam | S. Azam | Asif Karim | Ashraful Islam | N. Idris | Sanaz Kavianpour | Chao Liang | Bharanidharan Shanmugam
[1] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[2] Giancarlo Fortino,et al. Agent-based Internet of Things: State-of-the-art and research challenges , 2020, Future Gener. Comput. Syst..
[3] Mário M. Freire,et al. Challenges of securing Internet of Things devices: A survey , 2018, Secur. Priv..
[4] Balachandra Muniyal,et al. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .
[5] SchmidhuberJürgen. Deep learning in neural networks , 2015 .
[6] Bharanidharan Shanmugam,et al. An Intelligent Spam Detection Model Based on Artificial Immune System , 2019, Inf..
[7] Pete Burnap,et al. A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.
[8] Wensheng Yu,et al. A Formal Verification Framework for Security Issues of Blockchain Smart Contracts , 2020 .
[9] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[10] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[11] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[12] Haobin Shi,et al. A Multitier Reinforcement Learning Model for a Cooperative Multiagent System , 2020, IEEE Transactions on Cognitive and Developmental Systems.
[13] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[14] Thiemo Voigt,et al. Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[15] Jonte Bernhard,et al. Design science research – a powerful tool for improving methods in engineering education research , 2018, European Journal of Engineering Education.
[16] Nor Badrul Anuar,et al. The rise of traffic classification in IoT networks: A survey , 2020, J. Netw. Comput. Appl..
[17] Hong Linh Truong,et al. Decentralizing Air Traffic Flow Management with Blockchain-based Reinforcement Learning , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).
[18] Eugene H. Spafford. James P. Anderson: An Information Security Pioneer , 2008, IEEE Security & Privacy Magazine.
[19] Lianbing Deng,et al. IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning , 2019, Int. J. Inf. Manag..
[20] Howon Kim,et al. Network Intrusion Detection Based on Novel Feature Selection Model and Various Recurrent Neural Networks , 2019, Applied Sciences.
[21] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[22] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[23] WanJiafu,et al. Towards smart factory for industry 4.0 , 2016 .
[24] Davide Calvaresi,et al. The Good, the Bad, and the Ethical Implications of Bridging Blockchain and Multi-Agent Systems , 2019, Inf..
[25] Shlomo Zilberstein. BOOK REVIEW: "MULTIAGENT SYSTEMS: A MODERN APPROACH TO DISTRIBUTED ARTIFICIAL INTELLIGENCE", GERHARD WEISS , 2001 .
[26] Nima Jafari Navimipour,et al. Intrusion detection systems in the Internet of things: A comprehensive investigation , 2019, Comput. Networks.
[27] Shailendra Narayan Singh,et al. Security Attacks at MAC and Network Layer in Wireless Sensor Networks , 2019 .
[28] Parvez Faruki,et al. Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.
[29] Jin Cao,et al. An Automata Based Intrusion Detection Method for Internet of Things , 2017, Mob. Inf. Syst..
[30] Long C Nguyen,et al. Deep learning for computational structural optimization. , 2020, ISA transactions.
[31] Yong Wang,et al. End-to-End Trust and Security for Internet of Things Applications , 2018, Computer.
[32] Chao Liang,et al. Intrusion Detection System for Internet of Things based on a Machine Learning approach , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
[33] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[34] Salim Hariri,et al. IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[35] Ivan Kotuliak,et al. Management and Monitoring of IoT Devices Using Blockchain † , 2019, Sensors.
[36] Khaled Salah,et al. An intrusion detection framework for energy constrained IoT devices , 2020, Mechanical Systems and Signal Processing.
[37] Juan M. Corchado,et al. Blockchain framework for IoT data quality via edge computing , 2018, BlockSys@SenSys.
[38] Aleksandr Kapitonov,et al. Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs , 2017, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS).
[39] Daqiang Zhang,et al. Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination , 2016, Comput. Networks.