2026 Vol.9 Feb.N01 |
|---|
|
|
| Reference: [1] Sreevidya B, Supriya D M. Malicious Nodes Detection and Avoidance Using Trust-based Routing in Critical Data Handling Wireless Sensor Network Applications. Journal of Internet Services and Information Security, 2024, 14(3):226-244. [2] Subramani S, Selvi M. Intrusion detection system and fuzzy ant colony optimization-based secure routing in wireless sensor networks. Soft Computing, 2024, 28(17-18):10345-10367. [3] Gowdhaman V, Dhanapal R. Hybrid deep learning-based intrusion detection system for wireless sensor networks[J]. International Journal of Vehicle Information and Communication Systems, 2024, 9(3):239-255. [4] Ram R S, Saminathan A G. An Intrusion Detection System in WSN Using an Optimized Self-Attention-Based Progressive Generative Adversarial Network[J]. IETE Journal of Research, 2025, 71(4):1176-1189. [5] Zhang H, Yang J, Gao C Y. Spectrum Usage Anomaly Detection from Sub-Sampled Data Stream via Deep Neural Network[J]. Journal of Communications and Information Networks, 2023, 8(1):13-23. [6] Akilandeswari T, Surekha B, Subbarao P, et al. Arduino-Based Secured Access Control in Smart Homes by Implementing Anomaly Detection in Fingerprint-Based Door Lock and Real-Time Monitoring with OpenCV[J]. 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA), 2024:161-166. [7] Skaperas S, Mamatas L, Tsaoussidis V. A Link-Quality Anomaly Detection Framework for Software-Defined Wireless Mesh Networks[J]. IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2(000):495-510. [8] Darshan S, Radhika N, Radhika G. A Hybrid Prediction Model for Disseminating the Factors Related to Anomaly Detection in Software Defined Networks[J]. 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2024:1-5. [9] Kuchar K, Fujdiak R. Anomaly Detection in Industrial Networks: Current State, Classification, and Key Challenges[J]. Sensors Journal, IEEE, 2025, 25(3):5031-5043. [10] Hayati H, Wouw N V D, Murguia C. Immersion and Invariance-based Coding for Privacy in Remote Anomaly Detection[J]. IFAC PapersOnLine, 2023, 56(2):11191-11196. [11] Antony P D, Subiramaniyam N P. Integrating Advanced Convolutional Neural Networks and IoT in Health Monitoring: A Novel Approach to Real-Time Health Anomaly Detection and Risk Stratification Through Multi-Sensor Data Analysis[J]. Journal of Theoretical and Applied Information Technology, 2024, 102(6):2671-2692. [12] Carletti V, Foggia P, Rosa F, et al. Detecting malicious IoT network communication through Graph Neural Networks in real-world conditions[J]. Pattern Recognition Letters, 2025, 189(000):92-98. [13] Gawali V S, Ranjan N M. Anomaly detection system in 5G networks via deep learning model[J]. Int. J. Wireless & Mobile Computing, 2023, 24:287-302. [14] Wang Y, Nakachi T. Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation[J]. IEICE Transactions on Fundamentals of Electronics, Communications & Computer Sciences, 2024, E107/A(1):125-133. [15] Song Q. Research on the Application of Deep Learning-Based Computer Vision in Anomaly Detection in Communication Networks[J]. 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA), 2024:602-609. |
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16