共 40 条
[1]
Ahamed T, 2018, INT J COMPUT COMMUN, V13, P915
[2]
Secured Cyber-Attack Signatures Distribution using Blockchain Technology
[J].
2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019),
2019,
:482-488
[3]
DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (06)
[5]
[Anonymous], GUIDELINES PERFORMIN
[7]
Atlam HF, 2018, 2018 3RD CLOUDIFICATION OF THE INTERNET OF THINGS (CIOT)
[8]
Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things
[J].
16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020),
2020,
:429-435
[9]
Cup K., 2007, KDD Cup 1999 Data