메뉴 건너뛰기




Volumn , Issue , 2012, Pages 751-759

Histogram-based online anomaly detection in hierarchical wireless sensor networks

Author keywords

anomaly detection; distributed computing; error analysis; histogram

Indexed keywords

ANOMALY DETECTION; COMMUNICATION OVERHEADS; COMPUTATIONAL OVERHEADS; CYBER-ATTACKS; DATA SETS; HISTOGRAM; ONLINE ANOMALY DETECTION; OPTIMAL PARAMETER; RANDOM FAULTS; STREAMING DATA; WIRELESS SENSOR NETWORK (WSNS);

EID: 84868159713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.173     Document Type: Conference Paper
Times cited : (31)

References (18)
  • 1
  • 3
    • 77955684744 scopus 로고    scopus 로고
    • Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks
    • Sept
    • S. Rajasegarar, C. Leckie, J. C. Bezdek, and M. Palaniswami, "Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks," IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 518-533, Sept 2010.
    • (2010) IEEE Transactions on Information Forensics and Security , vol.5 , Issue.3 , pp. 518-533
    • Rajasegarar, S.1    Leckie, C.2    Bezdek, J.C.3    Palaniswami, M.4
  • 6
    • 14344259796 scopus 로고    scopus 로고
    • Distributed deviation detection in sensor networks
    • Dec
    • T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Distributed deviation detection in sensor networks," SIGMOD Record, vol. 32, no. 4, pp. 77-82, Dec 2003.
    • (2003) SIGMOD Record , vol.32 , Issue.4 , pp. 77-82
    • Palpanas, T.1    Papadopoulos, D.2    Kalogeraki, V.3    Gunopulos, D.4
  • 12
    • 11144277843 scopus 로고    scopus 로고
    • Routing techniques in wireless sensor networks: A survey
    • Dec
    • J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: A survey," IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, Dec 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 6-28
    • Al-Karaki, J.N.1    Kamal, A.E.2
  • 14
    • 84868125384 scopus 로고    scopus 로고
    • Intel Berkeley Research Lab, IBRL data
    • Intel Berkeley Research Lab, IBRL data, http://db.csail.mit.edu/labdata/ labdata.html.
  • 15
    • 68949196337 scopus 로고    scopus 로고
    • A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • November
    • X. D. Hoang, J. Hu, and P. Bertok, "A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Network and Computer Applications, vol. 32, no. 6, November 2009.
    • (2009) Journal of Network and Computer Applications , vol.32 , Issue.6
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 16
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
    • Feburary
    • J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection," Special Issue of Advances on Network Intrusion Detection, IEEE Network, vol. 23, no. 1, pp. 42-47, Feburary 2009.
    • (2009) Special Issue of Advances on Network Intrusion Detection, IEEE Network , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, H.-H.4
  • 17
    • 21644438395 scopus 로고    scopus 로고
    • An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls
    • X. D. Hoang and J. Hu, "An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls," in Proceedings of the 12th IEEE International Conference on Networks, vol. 2, 2004, pp. 470-474.
    • (2004) Proceedings of the 12th IEEE International Conference on Networks , vol.2 , pp. 470-474
    • Hoang, X.D.1    Hu, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.