参考文献
[ 1 ] 童安玲,黄玉划,曹玲玲. 能量受限无线传输的可靠性
分析[J]. 计算机工程,2013,39(5):106-109.
[ 2 ] Wang S S,Yan K Q,Wang S C,et al. An Integrated
Intrusion Detection System for Cluster-based Wireless
Sensor Networks[J]. Expert Systems with Applications,
2011,38(12):15234-15243.
[ 3 ] Abduvaliyev A, Lee S, Lee Y K. Energy Efficient
Hybrid Intrusion Detection System for Wireless Sensor
Networks [ C ] / / Proceedings of International Conference
on Electronics and Information Engineering.
Washington D.C.,USA:IEEE Press,2010:25-29.
[ 4 ] 张 帅,张凤斌. 无线传感器网络中基于规范的入侵
检测算法研究[J]. 计算机应用研究,2012,29(9):
3464-3466.
[ 5 ] Daniel J V,Joshna S,Manjula P. A Survey of Various
Intrusion Detection Techniques in Wireless Sensor
Networks[J]. Journal of Religion and Health March,
2013,52(1):235-246.
[ 6 ] 高 峥,陈蜀宇, 李国勇. 混合入侵检测系统的研
究[J]. 计算机技术与发展,2010,20(6):148-151.
[ 7 ] 胡明霞. 基于BP 神经网络的入侵检测算法[J]. 计算
机工程,2012,38(6):148-150.
[ 8 ] 罗晓波. 基于快速神经网络的入侵检测技术研
究[D]. 南京:南京林业大学,2011.
[ 9 ] Huang G B,Zhu Q Y, Siew C K. Extreme Learning
machine:Theory and Applications[J]. Neurocomputing,
2006,70(1):489-501.
[10] 邓万宇,郑庆华,陈 琳,等. 神经网络极速学习方法
研究[J]. 计算机学报,2010,33(2):279-287.
[11] Cheng C, Tay W P, Huang G B. Extreme Learning
Machines for Intrusion Detection[C]/ / Proceedings of 2012 International Joint Conference on Neural Networks.
Washington D. C.,USA:IEEE Press,2012:1-8.
[12] Fouchal S, Mansouri D, Mokdad L, et al. Recursiveclustering-
based Approach for Denial of Service(DoS) Attacks in Wireless Sensors Networks[J]. International
Journal of Communication Systems, 2013, 28 ( 2 ):
309-324.
[13] Stetsko A,Folkman L,Matyas V. Neighbor-based Intrusion
Betection for Wireless Sensor Networks[C]/ / Proceedings
of the 6th International Conference on Wireless and Mobile
Communications. Washington D. C., USA: IEEE Press,
2010:420-425.
[14] 刘 涛,熊 焰,黄文超,等. 一种基于Bayes 估计的
WSN 节点信任度计算模型[J]. 计算机科学,2013,
40(10):61-64.
[15] 李恒杰,李恒杰. 线性逼近SVM 在入侵检测中的应
用[J]. 计算机工程,2011,37(23):122-124.
编辑 索书志
|