[1]Chenji H, Zhang Wei, Won M, et al. A wireless system for reducing response time in Urban Search & Rescue[C]// Proceedings of the 31st IEEE International Performance Computing and Communications Conference (IPCCC). 2012:215-224.
[2]Wu D, Gupta D, Mohapatra P. QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations[J]. Ad Hoc Networks, 2011,9(7):1221-1237.
[3]杨亦洲,周杰,杜景林. 基于ModBus协议和ZigBee网络的气象无线传感网设计[J]. 电子技术应用, 2014,40(10):16-19.
[4]卿斯汉,蒋建春,马恒太,等. 入侵检测技术研究综述[J]. 通信学报, 2004,25(7):19-29.
[5]杨雅辉,黄海珍,沈晴霓,等. 基于增量式GHSOM神经网络模型的入侵检测研究[J]. 计算机学报, 2014,37(5):1216-1224.
[6]谭爱平,陈浩,吴伯桥. 基于SVM的网络入侵检测集成学习算法[J]. 计算机科学, 2014,41(2):197-200.
[7]刘春. 基于组合算法选择特征的网络入侵检测模型[J]. 计算机与现代化, 2014(8):75-80.
[8]肖国荣. 改进蚁群算法和支持向量机的网络入侵检测[J]. 计算机工程与应用, 2014,50(3):75-78.
[9]Hassanzadeh A, Stoleru R, Shihada B. Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks[M]// Ad-hoc, Mobile, and Wireless Networks. Springer Berlin Heidelberg, 2011:44-57.
[10]Saxena N, Denko M, Banerji D. A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks[J]. Computer Communications, 2011,34(4):548-555.
[11]Hassanzadeh A, Xu Z, Stoleru R, et al. PRIDE: Practical intrusion detection in resource constrained wireless mesh networks[J]. Lecture Notes in Computer Science, 2013,8233:213-228.
[12]夏秦,王志文,卢柯. 入侵检测系统利用信息熵检测网络攻击的方法[J]. 西安交通大学学报, 2013,47(2):14-19.
[13]赵建华,李伟华. 有监督SOM神经网络在入侵检测中的应用[J]. 计算机工程, 2012,38(12):110-111.
[14]王晟,赵壁芳. 基于模糊数据挖掘和遗传算法的网络入侵检测技术[J]. 计算机测量与控制, 2012,20(3):103-106.
[15]吴春琼. 基于特征选择的网络入侵检测模型[J]. 计算机仿真, 2012,29(6):136-139.
[16]汪洁. 基于神经网络的入侵检测系统的设计与实现[J]. 计算机应用与软件, 2013,30(5):320-322.
[17]Hiertz G R, Denteneer D, Max S, et al. IEEE 802.11s: The WLAN mesh standard[J]. IEEE Wireless Communications, 2010,17(1):104-111.
[18]Hassanzadeh A, Stoleru R. On the optimality of cooperative intrusion detection for resource constrained wireless networks[J]. Computers & Security, 2013,34:16-35.
[19]Hassanzadeh A, Xu Z, Stoleru R, et al. PRIDE: Practical intrusion detection in resource constrained wireless mesh networks[J]. Computer & Security, 2016,62:114-132. |