Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference23 articles.
1. Bao F, Chen R, Chang MJ et al (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169–183
2. Borkar GM, Patil LH, Dalgade D et al (2019) A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain Comput Inform Syst 23:120–135
3. Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282
4. Cao LL, Huang WB, Sun FC (2014) Optimization-based extreme learning machine with multi-kernel learning approach for classification. IEEE Comput Soc 14:3564–3569
5. Cheng C, Tay WP, Huang GB (2012) Extreme learning machines for intrusion detection. In: the 2012 international joint conference on neural networks (IJCNN). IEEE, pp 1–8
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献