Author:
Restuccia Francesco,D’Oro Salvatore,Zhang Liyang,Melodia Tommaso
Publisher
Springer International Publishing
Reference115 articles.
1. A.A. Aburomman, M.B.I. Reaz, A novel svm-knn-pso ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360–372 (2016)
2. A.A. Ahmed, N.F. Fisal, Secure real-time routing protocol with load distribution in wireless sensor networks. Secur. Commun. Netw. 4(8), 839–869 (2011)
3. L. Akoglu, C. Faloutsos, Anomaly, event, and fraud detection in large network datasets, in Proceeding of the ACM International Conference on Web Search and Data Mining (WSDM) (2013), pp. 773–774
4. I.F. Akyildiz, X. Wang, A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), S23–S30 (2005)
5. M.A. Alsheikh, S. Lin, D. Niyato, H.P. Tan, Machine learning in wireless sensor networks: algorithms, strategies, and applications. IEEE Commun. Surv. Tutorials 16(4), 1996–2018 (2014)