Reference: [1]D. Samfat and R. Molva, IDAMN: an intrusion detection architecture for mobile networks, IEEE Journal on Selected Areas in Communications, 7(2015),1373-1380. [2]E. Vasilomanolakis, S. Karuppayah and M. Fischer, Taxonomy and Survey of Collaborative Intrusion Detection, Acm Computing Surveys, 4(2015),1-33. [3]M.A.Ambusaidi, X. He, P. Nanda, et al, Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm, IEEE Transactions on Computers, 10(2016),2986-2998. [4]Q. Zhu, C. Fung, R. Boutaba, et al, GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks, IEEE Journal on Selected Areas in Communications, 11(2015),2220-2230. [5]A. Milenkoski, M. Vieira, S. Kounev, et al, Evaluating Computer Intrusion Detection Systems:A Survey of Common Practices, Acm Computing Surveys, 1(2015),1-41. [6]W. Bul'Ajoul, A. James and M. Pannu, Improving network intrusion detection system performance through quality of service configuration and parallel technology, Journal of Computer and System Sciences, 6(2015),981-999. [7]A. Khalili and A. Sami, SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm, Journal of Process Control, 11(2015),154-160. [8]K.A.P.Costa, L.A.M. Pereira, R.Y.M.Nakamura, et al, A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks, Information Sciences, C(2015),95-108. [9]M.M.Rathore, A.Ahmad and A.Paul, Real time intrusion detection system for ultra-high-speed big data environments, Journal of Supercomputing, 9(2016),3489-3510. [10]M.Andreolini, M.Colajanni and M.Marchetti, A collaborative framework for intrusion detection in mobile networks, Information Sciences, C(2015),179-192. [11]N.Marchang, R.Datta and S.K.Das, A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks, IEEE Transactions on Vehicular Technology, 2(2017),1684-1695. [12]P.Nader, P.Honeine and P.Beauseroy, Online One-class Classification for Intrusion Detection Based on the Mahalanobis Distance, Journal of Materials Science, 4(2015),1260-1264. [13]E.Viegas, A.O.Santin, A.França, et al, Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems, IEEE Transactions on Computers, 1(2017),163-177. [14]M.P.Arthur and K.Kannan, Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks, Wireless Networks, 3(2016),1035-1059. [15]D.Moon, S.B.Pan and I.Kim, Host-based intrusion detection system for secure human-centric computing, Journal of Supercomputing, 7(2016),2520-2536. [16]W.Peng, Q.Huang, X.J.Meng, et al, A Dynamic Network Threat Assessment Method Based on Multi-Source Information Fusion, Journal of China Academy of Electronics and Information Technology, 3(2016),250-256. [17]H.F.Li and X.G.Peng, Mobile Intelligent Terminal Intrusion Detection Method Based on Cloud Computing, Computer Simulation, 3(2016),380-384. [18]H.Q.Yan, Network Intrusion Small Signal Detection Model Based on Optimization Particle Swarm Algorithm, Bulletin of Science and Technology, 12(2015),193-195. [19]W.W.Ren, L.Hu and K.Zhao, Intrusion alert correlation model based on data mining and ontology, Journal of Jilin University(Engineering and Technology Edition), 3(2015),899-906. [20]S.Masarat, S.Sharifian and H.Taheri, Modified parallel random forest for intrusion detection systems, Journal of Supercomputing, 6(2016), 2235-2258.
|