共 15 条
[2]
[Anonymous], 2013, PROC INT C NETW SYST
[3]
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[4]
Event-based trust framework model in wireless sensor networks
[J].
PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE,
2008,
:359-+
[5]
CLAFFY KC, 1993, P ACM SIGCOMM, P13
[6]
Junqi Zhang, 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P484, DOI 10.1109/EUC.2010.80
[7]
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data
[J].
IEEE ACCESS,
2018, 6
:7234-7243
[9]
Papadogiannakis A., 2010, P EUROSEC
[10]
Dendron: Genetic trees driven rule induction for network intrusion detection systems
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 79
:558-574