An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
Author:
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Link
http://link.springer.com/content/pdf/10.1007/s11277-016-3433-3.pdf
Reference38 articles.
1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
2. Das, A. K., Sharma, P., Chatterjee, S., & Sing, J. K. (2012). A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications, 35(5), 1646–1656.
3. Dong, D., Li, M., Liu, Y., Li, X., & Liao, X. (2011). Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Transaction on Networking, 19(6), 1787–1796.
4. Shafieia, H., Khonsaria, A., Derakhshia, H., & Mousavia, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Computer and System Sciences, 80(3), 644–653.
5. Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Electrical and Computer Engineering, 1–8. Article ID 240217. doi: 10.1155/2014/240217 .
Cited by 64 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure localization techniques in wireless sensor networks against routing attacks based on hybrid machine learning models;Alexandria Engineering Journal;2023-11
2. An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge Computing;2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM);2023-09-21
3. Study on the wireless sensor networks routing for Low-Power FPGA hardware in field applications;Computers and Electronics in Agriculture;2023-09
4. Graph Neural Networks Based Anomalous RSSI Detection;2023 International Balkan Conference on Communications and Networking (BalkanCom);2023-06-05
5. Metaheuristic Firefly and C5.0 Algorithms Based Intrusion Detection for Critical Infrastructures;2023 3rd International Conference on Applied Artificial Intelligence (ICAPAI);2023-05-02
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3