共 25 条
- [1] Atzori L., Iera A., Morabito G., The internet of things: A survey, Computer Network, 54, 15, pp. 2787-2805, (2010)
- [2] Weiser M., The computer for the 21st century, Scientific American, 265, 3, pp. 94-105, (1991)
- [3] Sedjelmaci H., Senouci S.M., Al-Bahri M., Lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology, IEEE ICC - Mobile and Wireless Networking Symposium, (2016)
- [4] Raza S., Wallgren L., Voigt T., SVELTE: Real-time intrusion detection in the internet of things, Ad Hoc Networks, 11, 8, pp. 2661-2674, (2013)
- [5] Anand A., Patel B., An overview on intrusiondetection system and types of attacks it can detectconsidering different protocols, International Journal of Advanced Research in Computer Science and Software Engineering, 2, 8, pp. 94-98, (2012)
- [6] Rajasegarar S., Leckie C., Palaniswami M., Anomaly detection in wireless sensor networks, IEEEWireless Communications, 15, 4, pp. 34-40, (2008)
- [7] Li W.C., Yi P., Wu Y., Pan L., Li J.H., A newintrusion detection system based on KNN classificationalgorithm in wireless sensor network, Journal of Electrical and Computer Engineering, 2014, (2014)
- [8] Thanigaivelan N.K., Nigussie E., Kanth R.K., Virtanen S., Isoaho J., Distributed internal anomalydetection system for internet-of-things, 13th IEEEAnnual Consumer Communications & Networking Conference (CCNC), (2016)
- [9] Summerville D.H., Zach K.M., Chen Y., Ultra-lightweight deep packet anomaly detection for internet of things devices, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), (2015)
- [10] Huang S.H., Dimensionality reduction inautomatic knowledge acquisition: A simple greedysearch approach, IEEE Transactions on Knowledge and Data Engineering, 15, 6, pp. 1364-1373, (2003)