DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks
暂无分享,去创建一个
[1] Gopinath Ganapathy,et al. An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment , 2015 .
[2] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[3] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[4] Ying Lin,et al. Distributed detection of jamming and defense in wireless sensor networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[5] Sufian Hameed,et al. HADEC: Hadoop-based live DDoS detection framework , 2018, EURASIP J. Inf. Secur..
[6] Andrei V. Gurtov,et al. Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[7] Yanbing Liu,et al. C-RBFNN: A user retweet behavior prediction method for hotspot topics based on improved RBF neural network , 2018, Neurocomputing.
[8] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[9] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[10] Shambhu Upadhyaya,et al. Is RSSI a Reliable Parameter in Sensor Localization Algorithms – An Experimental Study , 2009 .
[11] Ademola P. Abidoye,et al. DDoS attacks in WSNs: detection and countermeasures , 2017, IET Wirel. Sens. Syst..
[12] Jianzhong Li,et al. Target Tracking under Uncertainty in Wireless Sensor Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[13] Paramvir Singh,et al. User behavior analytics-based classification of application layer HTTP-GET flood attacks , 2018, J. Netw. Comput. Appl..
[14] Pawel Kulakowski,et al. Wireless Sensor Network Deployment for Monitoring Wildlife Passages , 2010, Sensors.
[15] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[16] Sunny Behal,et al. D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events , 2018, J. Netw. Comput. Appl..
[17] Brij B. Gupta,et al. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2018, Journal of Ambient Intelligence and Humanized Computing.
[18] Mousa Al-Akhras,et al. WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks , 2016, J. Sensors.
[19] Chen Zhang,et al. A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[20] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[21] Abhinav Bhandari,et al. An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks , 2020 .
[22] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] G. R. Kanagachidambaresan,et al. An energy-aware buffer management (EABM) routing protocol for WSN , 2018, The Journal of Supercomputing.
[24] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[25] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[26] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[27] Gürkan Gür,et al. Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey , 2017, IEEE Systems Journal.
[28] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[29] Luca Mainetti,et al. Evolution of wireless sensor networks towards the Internet of Things: A survey , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.
[30] J. K. Kalita,et al. Botnet in DDoS Attacks: Trends and Challenges , 2015, IEEE Communications Surveys & Tutorials.
[31] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[32] R AshokkumarS.,et al. Extreme learning adaptive neuro-fuzzy inference system model for classifying the epilepsy using Q-Tuned wavelet transform , 2020, J. Intell. Fuzzy Syst..
[33] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[34] Emin Anarim,et al. Frequency based DDoS attack detection approach using naive Bayes classification , 2016, 2016 39th International Conference on Telecommunications and Signal Processing (TSP).
[35] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[36] R. Thirukkumaran,et al. Efficient Broadcast Authentication using TSG Algorithm for WSN , 2012 .